-
Notifications
You must be signed in to change notification settings - Fork 2
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Changes to be committed : Added OpenZeppelin Contract Library Contracts
- Loading branch information
Showing
155 changed files
with
10,410 additions
and
0 deletions.
There are no files selected for viewing
213 changes: 213 additions & 0 deletions
213
core/contracts/external/contracts/access/AccessControl.sol
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,213 @@ | ||
// SPDX-License-Identifier: MIT | ||
|
||
pragma solidity ^0.8.0; | ||
|
||
import "../utils/Context.sol"; | ||
import "../utils/introspection/ERC165.sol"; | ||
|
||
/** | ||
* @dev External interface of AccessControl declared to support ERC165 detection. | ||
*/ | ||
interface IAccessControl { | ||
function hasRole(bytes32 role, address account) external view returns (bool); | ||
function getRoleAdmin(bytes32 role) external view returns (bytes32); | ||
function grantRole(bytes32 role, address account) external; | ||
function revokeRole(bytes32 role, address account) external; | ||
function renounceRole(bytes32 role, address account) external; | ||
} | ||
|
||
/** | ||
* @dev Contract module that allows children to implement role-based access | ||
* control mechanisms. This is a lightweight version that doesn't allow enumerating role | ||
* members except through off-chain means by accessing the contract event logs. Some | ||
* applications may benefit from on-chain enumerability, for those cases see | ||
* {AccessControlEnumerable}. | ||
* | ||
* Roles are referred to by their `bytes32` identifier. These should be exposed | ||
* in the external API and be unique. The best way to achieve this is by | ||
* using `public constant` hash digests: | ||
* | ||
* ``` | ||
* bytes32 public constant MY_ROLE = keccak256("MY_ROLE"); | ||
* ``` | ||
* | ||
* Roles can be used to represent a set of permissions. To restrict access to a | ||
* function call, use {hasRole}: | ||
* | ||
* ``` | ||
* function foo() public { | ||
* require(hasRole(MY_ROLE, msg.sender)); | ||
* ... | ||
* } | ||
* ``` | ||
* | ||
* Roles can be granted and revoked dynamically via the {grantRole} and | ||
* {revokeRole} functions. Each role has an associated admin role, and only | ||
* accounts that have a role's admin role can call {grantRole} and {revokeRole}. | ||
* | ||
* By default, the admin role for all roles is `DEFAULT_ADMIN_ROLE`, which means | ||
* that only accounts with this role will be able to grant or revoke other | ||
* roles. More complex role relationships can be created by using | ||
* {_setRoleAdmin}. | ||
* | ||
* WARNING: The `DEFAULT_ADMIN_ROLE` is also its own admin: it has permission to | ||
* grant and revoke this role. Extra precautions should be taken to secure | ||
* accounts that have been granted it. | ||
*/ | ||
abstract contract AccessControl is Context, IAccessControl, ERC165 { | ||
struct RoleData { | ||
mapping (address => bool) members; | ||
bytes32 adminRole; | ||
} | ||
|
||
mapping (bytes32 => RoleData) private _roles; | ||
|
||
bytes32 public constant DEFAULT_ADMIN_ROLE = 0x00; | ||
|
||
/** | ||
* @dev Emitted when `newAdminRole` is set as ``role``'s admin role, replacing `previousAdminRole` | ||
* | ||
* `DEFAULT_ADMIN_ROLE` is the starting admin for all roles, despite | ||
* {RoleAdminChanged} not being emitted signaling this. | ||
* | ||
* _Available since v3.1._ | ||
*/ | ||
event RoleAdminChanged(bytes32 indexed role, bytes32 indexed previousAdminRole, bytes32 indexed newAdminRole); | ||
|
||
/** | ||
* @dev Emitted when `account` is granted `role`. | ||
* | ||
* `sender` is the account that originated the contract call, an admin role | ||
* bearer except when using {_setupRole}. | ||
*/ | ||
event RoleGranted(bytes32 indexed role, address indexed account, address indexed sender); | ||
|
||
/** | ||
* @dev Emitted when `account` is revoked `role`. | ||
* | ||
* `sender` is the account that originated the contract call: | ||
* - if using `revokeRole`, it is the admin role bearer | ||
* - if using `renounceRole`, it is the role bearer (i.e. `account`) | ||
*/ | ||
event RoleRevoked(bytes32 indexed role, address indexed account, address indexed sender); | ||
|
||
/** | ||
* @dev See {IERC165-supportsInterface}. | ||
*/ | ||
function supportsInterface(bytes4 interfaceId) public view virtual override returns (bool) { | ||
return interfaceId == type(IAccessControl).interfaceId | ||
|| super.supportsInterface(interfaceId); | ||
} | ||
|
||
/** | ||
* @dev Returns `true` if `account` has been granted `role`. | ||
*/ | ||
function hasRole(bytes32 role, address account) public view override returns (bool) { | ||
return _roles[role].members[account]; | ||
} | ||
|
||
/** | ||
* @dev Returns the admin role that controls `role`. See {grantRole} and | ||
* {revokeRole}. | ||
* | ||
* To change a role's admin, use {_setRoleAdmin}. | ||
*/ | ||
function getRoleAdmin(bytes32 role) public view override returns (bytes32) { | ||
return _roles[role].adminRole; | ||
} | ||
|
||
/** | ||
* @dev Grants `role` to `account`. | ||
* | ||
* If `account` had not been already granted `role`, emits a {RoleGranted} | ||
* event. | ||
* | ||
* Requirements: | ||
* | ||
* - the caller must have ``role``'s admin role. | ||
*/ | ||
function grantRole(bytes32 role, address account) public virtual override { | ||
require(hasRole(getRoleAdmin(role), _msgSender()), "AccessControl: sender must be an admin to grant"); | ||
|
||
_grantRole(role, account); | ||
} | ||
|
||
/** | ||
* @dev Revokes `role` from `account`. | ||
* | ||
* If `account` had been granted `role`, emits a {RoleRevoked} event. | ||
* | ||
* Requirements: | ||
* | ||
* - the caller must have ``role``'s admin role. | ||
*/ | ||
function revokeRole(bytes32 role, address account) public virtual override { | ||
require(hasRole(getRoleAdmin(role), _msgSender()), "AccessControl: sender must be an admin to revoke"); | ||
|
||
_revokeRole(role, account); | ||
} | ||
|
||
/** | ||
* @dev Revokes `role` from the calling account. | ||
* | ||
* Roles are often managed via {grantRole} and {revokeRole}: this function's | ||
* purpose is to provide a mechanism for accounts to lose their privileges | ||
* if they are compromised (such as when a trusted device is misplaced). | ||
* | ||
* If the calling account had been granted `role`, emits a {RoleRevoked} | ||
* event. | ||
* | ||
* Requirements: | ||
* | ||
* - the caller must be `account`. | ||
*/ | ||
function renounceRole(bytes32 role, address account) public virtual override { | ||
require(account == _msgSender(), "AccessControl: can only renounce roles for self"); | ||
|
||
_revokeRole(role, account); | ||
} | ||
|
||
/** | ||
* @dev Grants `role` to `account`. | ||
* | ||
* If `account` had not been already granted `role`, emits a {RoleGranted} | ||
* event. Note that unlike {grantRole}, this function doesn't perform any | ||
* checks on the calling account. | ||
* | ||
* [WARNING] | ||
* ==== | ||
* This function should only be called from the constructor when setting | ||
* up the initial roles for the system. | ||
* | ||
* Using this function in any other way is effectively circumventing the admin | ||
* system imposed by {AccessControl}. | ||
* ==== | ||
*/ | ||
function _setupRole(bytes32 role, address account) internal virtual { | ||
_grantRole(role, account); | ||
} | ||
|
||
/** | ||
* @dev Sets `adminRole` as ``role``'s admin role. | ||
* | ||
* Emits a {RoleAdminChanged} event. | ||
*/ | ||
function _setRoleAdmin(bytes32 role, bytes32 adminRole) internal virtual { | ||
emit RoleAdminChanged(role, getRoleAdmin(role), adminRole); | ||
_roles[role].adminRole = adminRole; | ||
} | ||
|
||
function _grantRole(bytes32 role, address account) private { | ||
if (!hasRole(role, account)) { | ||
_roles[role].members[account] = true; | ||
emit RoleGranted(role, account, _msgSender()); | ||
} | ||
} | ||
|
||
function _revokeRole(bytes32 role, address account) private { | ||
if (hasRole(role, account)) { | ||
_roles[role].members[account] = false; | ||
emit RoleRevoked(role, account, _msgSender()); | ||
} | ||
} | ||
} |
87 changes: 87 additions & 0 deletions
87
core/contracts/external/contracts/access/AccessControlEnumerable.sol
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,87 @@ | ||
// SPDX-License-Identifier: MIT | ||
|
||
pragma solidity ^0.8.0; | ||
|
||
import "./AccessControl.sol"; | ||
import "../utils/structs/EnumerableSet.sol"; | ||
|
||
/** | ||
* @dev External interface of AccessControlEnumerable declared to support ERC165 detection. | ||
*/ | ||
interface IAccessControlEnumerable { | ||
function getRoleMember(bytes32 role, uint256 index) external view returns (address); | ||
function getRoleMemberCount(bytes32 role) external view returns (uint256); | ||
} | ||
|
||
/** | ||
* @dev Extension of {AccessControl} that allows enumerating the members of each role. | ||
*/ | ||
abstract contract AccessControlEnumerable is IAccessControlEnumerable, AccessControl { | ||
using EnumerableSet for EnumerableSet.AddressSet; | ||
|
||
mapping (bytes32 => EnumerableSet.AddressSet) private _roleMembers; | ||
|
||
/** | ||
* @dev See {IERC165-supportsInterface}. | ||
*/ | ||
function supportsInterface(bytes4 interfaceId) public view virtual override returns (bool) { | ||
return interfaceId == type(IAccessControlEnumerable).interfaceId | ||
|| super.supportsInterface(interfaceId); | ||
} | ||
|
||
/** | ||
* @dev Returns one of the accounts that have `role`. `index` must be a | ||
* value between 0 and {getRoleMemberCount}, non-inclusive. | ||
* | ||
* Role bearers are not sorted in any particular way, and their ordering may | ||
* change at any point. | ||
* | ||
* WARNING: When using {getRoleMember} and {getRoleMemberCount}, make sure | ||
* you perform all queries on the same block. See the following | ||
* https://forum.openzeppelin.com/t/iterating-over-elements-on-enumerableset-in-openzeppelin-contracts/2296[forum post] | ||
* for more information. | ||
*/ | ||
function getRoleMember(bytes32 role, uint256 index) public view override returns (address) { | ||
return _roleMembers[role].at(index); | ||
} | ||
|
||
/** | ||
* @dev Returns the number of accounts that have `role`. Can be used | ||
* together with {getRoleMember} to enumerate all bearers of a role. | ||
*/ | ||
function getRoleMemberCount(bytes32 role) public view override returns (uint256) { | ||
return _roleMembers[role].length(); | ||
} | ||
|
||
/** | ||
* @dev Overload {grantRole} to track enumerable memberships | ||
*/ | ||
function grantRole(bytes32 role, address account) public virtual override { | ||
super.grantRole(role, account); | ||
_roleMembers[role].add(account); | ||
} | ||
|
||
/** | ||
* @dev Overload {revokeRole} to track enumerable memberships | ||
*/ | ||
function revokeRole(bytes32 role, address account) public virtual override { | ||
super.revokeRole(role, account); | ||
_roleMembers[role].remove(account); | ||
} | ||
|
||
/** | ||
* @dev Overload {renounceRole} to track enumerable memberships | ||
*/ | ||
function renounceRole(bytes32 role, address account) public virtual override { | ||
super.renounceRole(role, account); | ||
_roleMembers[role].remove(account); | ||
} | ||
|
||
/** | ||
* @dev Overload {_setupRole} to track enumerable memberships | ||
*/ | ||
function _setupRole(bytes32 role, address account) internal virtual override { | ||
super._setupRole(role, account); | ||
_roleMembers[role].add(account); | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,68 @@ | ||
// SPDX-License-Identifier: MIT | ||
|
||
pragma solidity ^0.8.0; | ||
|
||
import "../utils/Context.sol"; | ||
/** | ||
* @dev Contract module which provides a basic access control mechanism, where | ||
* there is an account (an owner) that can be granted exclusive access to | ||
* specific functions. | ||
* | ||
* By default, the owner account will be the one that deploys the contract. This | ||
* can later be changed with {transferOwnership}. | ||
* | ||
* This module is used through inheritance. It will make available the modifier | ||
* `onlyOwner`, which can be applied to your functions to restrict their use to | ||
* the owner. | ||
*/ | ||
abstract contract Ownable is Context { | ||
address private _owner; | ||
|
||
event OwnershipTransferred(address indexed previousOwner, address indexed newOwner); | ||
|
||
/** | ||
* @dev Initializes the contract setting the deployer as the initial owner. | ||
*/ | ||
constructor () { | ||
address msgSender = _msgSender(); | ||
_owner = msgSender; | ||
emit OwnershipTransferred(address(0), msgSender); | ||
} | ||
|
||
/** | ||
* @dev Returns the address of the current owner. | ||
*/ | ||
function owner() public view virtual returns (address) { | ||
return _owner; | ||
} | ||
|
||
/** | ||
* @dev Throws if called by any account other than the owner. | ||
*/ | ||
modifier onlyOwner() { | ||
require(owner() == _msgSender(), "Ownable: caller is not the owner"); | ||
_; | ||
} | ||
|
||
/** | ||
* @dev Leaves the contract without owner. It will not be possible to call | ||
* `onlyOwner` functions anymore. Can only be called by the current owner. | ||
* | ||
* NOTE: Renouncing ownership will leave the contract without an owner, | ||
* thereby removing any functionality that is only available to the owner. | ||
*/ | ||
function renounceOwnership() public virtual onlyOwner { | ||
emit OwnershipTransferred(_owner, address(0)); | ||
_owner = address(0); | ||
} | ||
|
||
/** | ||
* @dev Transfers ownership of the contract to a new account (`newOwner`). | ||
* Can only be called by the current owner. | ||
*/ | ||
function transferOwnership(address newOwner) public virtual onlyOwner { | ||
require(newOwner != address(0), "Ownable: new owner is the zero address"); | ||
emit OwnershipTransferred(_owner, newOwner); | ||
_owner = newOwner; | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
= Access | ||
|
||
[.readme-notice] | ||
NOTE: This document is better viewed at https://docs.openzeppelin.com/contracts/api/access | ||
|
||
This directory provides ways to restrict who can access the functions of a contract or when they can do it. | ||
|
||
- {AccessControl} provides a general role based access control mechanism. Multiple hierarchical roles can be created and assigned each to multiple accounts. | ||
- {Ownable} is a simpler mechanism with a single owner "role" that can be assigned to a single account. This simpler mechanism can be useful for quick tests but projects with production concerns are likely to outgrow it. | ||
== Authorization | ||
|
||
{{Ownable}} | ||
|
||
{{AccessControl}} | ||
|
||
{{AccessControlEnumerable}} |
Oops, something went wrong.