// SPDX-License-Identifier: Apache-2.0.pragmasolidity ^0.6.12;/*
Common Utility Libraries.
I. Addresses (extending address).
*/libraryAddresses{
/*
Note: isContract function has some known limitation.
See https://github.com/OpenZeppelin/
openzeppelin-contracts/blob/master/contracts/utils/Address.sol.
*/functionisContract(address account) internalviewreturns (bool) {
uint256 size;
assembly {
size :=extcodesize(account)
}
return size >0;
}
functionperformEthTransfer(address recipient, uint256 amount) internal{
(bool success, ) = recipient.call{value: amount}(""); // NOLINT: low-level-calls.require(success, "ETH_TRANSFER_FAILED");
}
/*
Safe wrapper around ERC20/ERC721 calls.
This is required because many deployed ERC20 contracts don't return a value.
See https://github.com/ethereum/solidity/issues/4116.
*/functionsafeTokenContractCall(address tokenAddress, bytesmemory callData) internal{
require(isContract(tokenAddress), "BAD_TOKEN_ADDRESS");
// NOLINTNEXTLINE: low-level-calls.
(bool success, bytesmemory returndata) = tokenAddress.call(callData);
require(success, string(returndata));
if (returndata.length>0) {
require(abi.decode(returndata, (bool)), "TOKEN_OPERATION_FAILED");
}
}
}
Contract Source Code
File 2 of 8: Governance.sol
// SPDX-License-Identifier: Apache-2.0.pragmasolidity ^0.6.12;import"MGovernance.sol";
/*
Implements Generic Governance, applicable for both proxy and main contract, and possibly others.
Notes:
The use of the same function names by both the Proxy and a delegated implementation
is not possible since calling the implementation functions is done via the default function
of the Proxy. For this reason, for example, the implementation of MainContract (MainGovernance)
exposes mainIsGovernor, which calls the internal _isGovernor method.
*/structGovernanceInfoStruct {
mapping(address=>bool) effectiveGovernors;
address candidateGovernor;
bool initialized;
}
abstractcontractGovernanceisMGovernance{
eventLogNominatedGovernor(address nominatedGovernor);
eventLogNewGovernorAccepted(address acceptedGovernor);
eventLogRemovedGovernor(address removedGovernor);
eventLogNominationCancelled();
functiongetGovernanceInfo() internalviewvirtualreturns (GovernanceInfoStruct storage);
/*
Current code intentionally prevents governance re-initialization.
This may be a problem in an upgrade situation, in a case that the upgrade-to implementation
performs an initialization (for real) and within that calls initGovernance().
Possible workarounds:
1. Clearing the governance info altogether by changing the MAIN_GOVERNANCE_INFO_TAG.
This will remove existing main governance information.
2. Modify the require part in this function, so that it will exit quietly
when trying to re-initialize (uncomment the lines below).
*/functioninitGovernance() internal{
GovernanceInfoStruct storage gub = getGovernanceInfo();
require(!gub.initialized, "ALREADY_INITIALIZED");
gub.initialized =true; // to ensure acceptNewGovernor() won't fail.// Add the initial governer.
acceptNewGovernor(msg.sender);
}
function_isGovernor(address user) internalviewoverridereturns (bool) {
GovernanceInfoStruct storage gub = getGovernanceInfo();
return gub.effectiveGovernors[user];
}
/*
Cancels the nomination of a governor candidate.
*/function_cancelNomination() internalonlyGovernance{
GovernanceInfoStruct storage gub = getGovernanceInfo();
if (gub.candidateGovernor !=address(0x0)) {
gub.candidateGovernor =address(0x0);
emit LogNominationCancelled();
}
}
function_nominateNewGovernor(address newGovernor) internalonlyGovernance{
GovernanceInfoStruct storage gub = getGovernanceInfo();
require(newGovernor !=address(0x0), "BAD_ADDRESS");
require(!_isGovernor(newGovernor), "ALREADY_GOVERNOR");
require(gub.candidateGovernor ==address(0x0), "OTHER_CANDIDATE_PENDING");
gub.candidateGovernor = newGovernor;
emit LogNominatedGovernor(newGovernor);
}
/*
The acceptNewGovernor is called in two cases:
1. by _acceptGovernance when a new governor accepts its role.
2. by initGovernance to add the initial governor.
The difference is that the init path skips the nominate step
that would fail because of the onlyGovernance modifier.
*/functionacceptNewGovernor(address newGovernor) private{
require(!_isGovernor(newGovernor), "ALREADY_GOVERNOR");
GovernanceInfoStruct storage gub = getGovernanceInfo();
gub.effectiveGovernors[newGovernor] =true;
// Emit governance information.emit LogNewGovernorAccepted(newGovernor);
}
function_acceptGovernance() internal{
// The new governor was proposed as a candidate by the current governor.
GovernanceInfoStruct storage gub = getGovernanceInfo();
require(msg.sender== gub.candidateGovernor, "ONLY_CANDIDATE_GOVERNOR");
// Update state.
acceptNewGovernor(gub.candidateGovernor);
gub.candidateGovernor =address(0x0);
}
/*
Remove a governor from office.
*/function_removeGovernor(address governorForRemoval) internalonlyGovernance{
require(msg.sender!= governorForRemoval, "GOVERNOR_SELF_REMOVE");
GovernanceInfoStruct storage gub = getGovernanceInfo();
require(_isGovernor(governorForRemoval), "NOT_GOVERNOR");
gub.effectiveGovernors[governorForRemoval] =false;
emit LogRemovedGovernor(governorForRemoval);
}
}
Contract Source Code
File 3 of 8: GovernanceStorage.sol
// SPDX-License-Identifier: Apache-2.0.pragmasolidity ^0.6.12;import {GovernanceInfoStruct} from"Governance.sol";
/*
Holds the governance slots for ALL entities, including proxy and the main contract.
*/contractGovernanceStorage{
// A map from a Governor tag to its own GovernanceInfoStruct.mapping(string=> GovernanceInfoStruct) internal governanceInfo; //NOLINT uninitialized-state.
}
Contract Source Code
File 4 of 8: MGovernance.sol
// SPDX-License-Identifier: Apache-2.0.pragmasolidity ^0.6.12;abstractcontractMGovernance{
function_isGovernor(address user) internalviewvirtualreturns (bool);
/*
Allows calling the function only by a Governor.
*/modifieronlyGovernance() {
require(_isGovernor(msg.sender), "ONLY_GOVERNANCE");
_;
}
}
Contract Source Code
File 5 of 8: Proxy.sol
// SPDX-License-Identifier: Apache-2.0.pragmasolidity ^0.6.12;import"ProxyGovernance.sol";
import"ProxyStorage.sol";
import"StorageSlots.sol";
import"Addresses.sol";
/**
The Proxy contract implements delegation of calls to other contracts (`implementations`), with
proper forwarding of return values and revert reasons. This pattern allows retaining the contract
storage while replacing implementation code.
The following operations are supported by the proxy contract:
- :sol:func:`addImplementation`: Defines a new implementation, the data with which it should be initialized and whether this will be the last version of implementation.
- :sol:func:`upgradeTo`: Once an implementation is added, the governor may upgrade to that implementation only after a safety time period has passed (time lock), the current implementation is not the last version and the implementation is not frozen (see :sol:mod:`FullWithdrawals`).
- :sol:func:`removeImplementation`: Any announced implementation may be removed. Removing an implementation is especially important once it has been used for an upgrade in order to avoid an additional unwanted revert to an older version.
The only entity allowed to perform the above operations is the proxy governor
(see :sol:mod:`ProxyGovernance`).
Every implementation is required to have an `initialize` function that replaces the constructor
of a normal contract. Furthermore, the only parameter of this function is an array of bytes
(`data`) which may be decoded arbitrarily by the `initialize` function. It is up to the
implementation to ensure that this function cannot be run more than once if so desired.
When an implementation is added (:sol:func:`addImplementation`) the initialization `data` is also
announced, allowing users of the contract to analyze the full effect of an upgrade to the new
implementation. During an :sol:func:`upgradeTo`, the `data` is provided again and only if it is
identical to the announced `data` is the upgrade performed by pointing the proxy to the new
implementation and calling its `initialize` function with this `data`.
It is the responsibility of the implementation not to overwrite any storage belonging to the
proxy (`ProxyStorage`). In addition, upon upgrade, the new implementation is assumed to be
backward compatible with previous implementations with respect to the storage used until that
point.
*/contractProxyisProxyStorage, ProxyGovernance, StorageSlots{
// Emitted when the active implementation is replaced.eventImplementationUpgraded(addressindexed implementation, bytes initializer);
// Emitted when an implementation is submitted as an upgrade candidate and a time lock// is activated.eventImplementationAdded(addressindexed implementation, bytes initializer, bool finalize);
// Emitted when an implementation is removed from the list of upgrade candidates.eventImplementationRemoved(addressindexed implementation, bytes initializer, bool finalize);
// Emitted when the implementation is finalized.eventFinalizedImplementation(addressindexed implementation);
usingAddressesforaddress;
stringpublicconstant PROXY_VERSION ="3.0.1";
constructor(uint256 upgradeActivationDelay) public{
initGovernance();
setUpgradeActivationDelay(upgradeActivationDelay);
}
functionsetUpgradeActivationDelay(uint256 delayInSeconds) private{
bytes32 slot = UPGRADE_DELAY_SLOT;
assembly {
sstore(slot, delayInSeconds)
}
}
functiongetUpgradeActivationDelay() publicviewreturns (uint256 delay) {
bytes32 slot = UPGRADE_DELAY_SLOT;
assembly {
delay :=sload(slot)
}
return delay;
}
/*
Returns the address of the current implementation.
*/// NOLINTNEXTLINE external-function.functionimplementation() publicviewreturns (address _implementation) {
bytes32 slot = IMPLEMENTATION_SLOT;
assembly {
_implementation :=sload(slot)
}
}
/*
Returns true if the implementation is frozen.
If the implementation was not assigned yet, returns false.
*/functionimplementationIsFrozen() privatereturns (bool) {
address _implementation = implementation();
// We can't call low level implementation before it's assigned. (i.e. ZERO).if (_implementation ==address(0x0)) {
returnfalse;
}
// NOLINTNEXTLINE: low-level-calls.
(bool success, bytesmemory returndata) = _implementation.delegatecall(
abi.encodeWithSignature("isFrozen()")
);
require(success, string(returndata));
returnabi.decode(returndata, (bool));
}
/*
This method blocks delegation to initialize().
Only upgradeTo should be able to delegate call to initialize().
*/functioninitialize(bytescalldata/*data*/) externalpure{
revert("CANNOT_CALL_INITIALIZE");
}
modifiernotFinalized() {
require(isNotFinalized(), "IMPLEMENTATION_FINALIZED");
_;
}
/*
Forbids calling the function if the implementation is frozen.
This modifier relies on the lower level (logical contract) implementation of isFrozen().
*/modifiernotFrozen() {
require(!implementationIsFrozen(), "STATE_IS_FROZEN");
_;
}
/*
This entry point serves only transactions with empty calldata. (i.e. pure value transfer tx).
We don't expect to receive such, thus block them.
*/receive() externalpayable{
revert("CONTRACT_NOT_EXPECTED_TO_RECEIVE");
}
/*
Contract's default function. Delegates execution to the implementation contract.
It returns back to the external caller whatever the implementation delegated code returns.
*/fallback() externalpayable{
address _implementation = implementation();
require(_implementation !=address(0x0), "MISSING_IMPLEMENTATION");
assembly {
// Copy msg.data. We take full control of memory in this inline assembly// block because it will not return to Solidity code. We overwrite the// Solidity scratch pad at memory position 0.calldatacopy(0, 0, calldatasize())
// Call the implementation.// out and outsize are 0 for now, as we don't know the out size yet.let result :=delegatecall(gas(), _implementation, 0, calldatasize(), 0, 0)
// Copy the returned data.returndatacopy(0, 0, returndatasize())
switch result
// delegatecall returns 0 on error.case0 {
revert(0, returndatasize())
}
default {
return(0, returndatasize())
}
}
}
/*
Sets the implementation address of the proxy.
*/functionsetImplementation(address newImplementation) private{
bytes32 slot = IMPLEMENTATION_SLOT;
assembly {
sstore(slot, newImplementation)
}
}
/*
Returns true if the contract is not in the finalized state.
*/functionisNotFinalized() publicviewreturns (bool notFinal) {
bytes32 slot = FINALIZED_STATE_SLOT;
uint256 slotValue;
assembly {
slotValue :=sload(slot)
}
notFinal = (slotValue ==0);
}
/*
Marks the current implementation as finalized.
*/functionsetFinalizedFlag() private{
bytes32 slot = FINALIZED_STATE_SLOT;
assembly {
sstore(slot, 0x1)
}
}
/*
Introduce an implementation and its initialization vector,
and start the time-lock before it can be upgraded to.
addImplementation is not blocked when frozen or finalized.
(upgradeTo API is blocked when finalized or frozen).
*/functionaddImplementation(address newImplementation,
bytescalldata data,
bool finalize
) externalonlyGovernance{
require(newImplementation.isContract(), "ADDRESS_NOT_CONTRACT");
bytes32 implVectorHash =keccak256(abi.encode(newImplementation, data, finalize));
uint256 activationTime =block.timestamp+ getUpgradeActivationDelay();
enabledTime[implVectorHash] = activationTime;
emit ImplementationAdded(newImplementation, data, finalize);
}
/*
Removes a candidate implementation.
Note that it is possible to remove the current implementation. Doing so doesn't affect the
current implementation, but rather revokes it as a future candidate.
*/functionremoveImplementation(address removedImplementation,
bytescalldata data,
bool finalize
) externalonlyGovernance{
bytes32 implVectorHash =keccak256(abi.encode(removedImplementation, data, finalize));
// If we have initializer, we set the hash of it.uint256 activationTime = enabledTime[implVectorHash];
require(activationTime >0, "UNKNOWN_UPGRADE_INFORMATION");
delete enabledTime[implVectorHash];
emit ImplementationRemoved(removedImplementation, data, finalize);
}
/*
Upgrades the proxy to a new implementation, with its initialization.
to upgrade successfully, implementation must have been added time-lock agreeably
before, and the init vector must be identical ot the one submitted before.
Upon assignment of new implementation address,
its initialize will be called with the initializing vector (even if empty).
Therefore, the implementation MUST must have such a method.
Note - Initialization data is committed to in advance, therefore it must remain valid
until the actual contract upgrade takes place.
Care should be taken regarding initialization data and flow when planning the contract upgrade.
When planning contract upgrade, special care is also needed with regard to governance
(See comments in Governance.sol).
*/// NOLINTNEXTLINE: reentrancy-events timestamp.functionupgradeTo(address newImplementation,
bytescalldata data,
bool finalize
) externalpayableonlyGovernancenotFinalizednotFrozen{
bytes32 implVectorHash =keccak256(abi.encode(newImplementation, data, finalize));
uint256 activationTime = enabledTime[implVectorHash];
require(activationTime >0, "UNKNOWN_UPGRADE_INFORMATION");
require(newImplementation.isContract(), "ADDRESS_NOT_CONTRACT");
// On the first time an implementation is set - time-lock should not be enforced.require(
activationTime <=block.timestamp|| implementation() ==address(0x0),
"UPGRADE_NOT_ENABLED_YET"
);
setImplementation(newImplementation);
// NOLINTNEXTLINE: low-level-calls controlled-delegatecall.
(bool success, bytesmemory returndata) = newImplementation.delegatecall(
abi.encodeWithSelector(this.initialize.selector, data)
);
require(success, string(returndata));
// Verify that the new implementation is not frozen post initialization.// NOLINTNEXTLINE: low-level-calls controlled-delegatecall.
(success, returndata) = newImplementation.delegatecall(
abi.encodeWithSignature("isFrozen()")
);
require(success, "CALL_TO_ISFROZEN_REVERTED");
require(!abi.decode(returndata, (bool)), "NEW_IMPLEMENTATION_FROZEN");
if (finalize) {
setFinalizedFlag();
emit FinalizedImplementation(newImplementation);
}
emit ImplementationUpgraded(newImplementation, data);
}
}
Contract Source Code
File 6 of 8: ProxyGovernance.sol
// SPDX-License-Identifier: Apache-2.0.pragmasolidity ^0.6.12;import"Governance.sol";
import"GovernanceStorage.sol";
/**
The Proxy contract is governed by one or more Governors of which the initial one is the
deployer of the contract.
A governor has the sole authority to perform the following operations:
1. Nominate additional governors (:sol:func:`proxyNominateNewGovernor`)
2. Remove other governors (:sol:func:`proxyRemoveGovernor`)
3. Add new `implementations` (proxied contracts)
4. Remove (new or old) `implementations`
5. Update `implementations` after a timelock allows it
Adding governors is performed in a two step procedure:
1. First, an existing governor nominates a new governor (:sol:func:`proxyNominateNewGovernor`)
2. Then, the new governor must accept governance to become a governor (:sol:func:`proxyAcceptGovernance`)
This two step procedure ensures that a governor public key cannot be nominated unless there is an
entity that has the corresponding private key. This is intended to prevent errors in the addition
process.
The governor private key should typically be held in a secure cold wallet or managed via a
multi-sig contract.
*//*
Implements Governance for the proxy contract.
It is a thin wrapper to the Governance contract,
which is needed so that it can have non-colliding function names,
and a specific tag (key) to allow unique state storage.
*/contractProxyGovernanceisGovernanceStorage, Governance{
// The tag is the string key that is used in the Governance storage mapping.stringpublicconstant PROXY_GOVERNANCE_TAG ="StarkEx.Proxy.2019.GovernorsInformation";
/*
Returns the GovernanceInfoStruct associated with the governance tag.
*/functiongetGovernanceInfo() internalviewoverridereturns (GovernanceInfoStruct storage) {
return governanceInfo[PROXY_GOVERNANCE_TAG];
}
functionproxyIsGovernor(address user) externalviewreturns (bool) {
return _isGovernor(user);
}
functionproxyNominateNewGovernor(address newGovernor) external{
_nominateNewGovernor(newGovernor);
}
functionproxyRemoveGovernor(address governorForRemoval) external{
_removeGovernor(governorForRemoval);
}
functionproxyAcceptGovernance() external{
_acceptGovernance();
}
functionproxyCancelNomination() external{
_cancelNomination();
}
}
Contract Source Code
File 7 of 8: ProxyStorage.sol
// SPDX-License-Identifier: Apache-2.0.pragmasolidity ^0.6.12;import"GovernanceStorage.sol";
/*
Holds the Proxy-specific state variables.
This contract is inherited by the GovernanceStorage (and indirectly by MainStorage)
to prevent collision hazard.
*/contractProxyStorageisGovernanceStorage{
// NOLINTNEXTLINE: naming-convention uninitialized-state.mapping(address=>bytes32) internal initializationHash_DEPRECATED;
// The time after which we can switch to the implementation.// Hash(implementation, data, finalize) => time.mapping(bytes32=>uint256) internal enabledTime;
// A central storage of the flags whether implementation has been initialized.// Note - it can be used flexibly enough to accommodate multiple levels of initialization// (i.e. using different key salting schemes for different initialization levels).mapping(bytes32=>bool) internal initialized;
}
Contract Source Code
File 8 of 8: StorageSlots.sol
// SPDX-License-Identifier: Apache-2.0.pragmasolidity ^0.6.12;/**
StorageSlots holds the arbitrary storage slots used throughout the Proxy pattern.
Storage address slots are a mechanism to define an arbitrary location, that will not be
overlapped by the logical contracts.
*/contractStorageSlots{
// Storage slot with the address of the current implementation.// The address of the slot is keccak256("StarkWare2019.implemntation-slot").// We need to keep this variable stored outside of the commonly used space,// so that it's not overrun by the logical implementation (the proxied contract).bytes32internalconstant IMPLEMENTATION_SLOT =0x177667240aeeea7e35eabe3a35e18306f336219e1386f7710a6bf8783f761b24;
// Storage slot with the address of the call-proxy current implementation.// The address of the slot is keccak256("'StarkWare2020.CallProxy.Implemntation.Slot'").// We need to keep this variable stored outside of the commonly used space.// so that it's not overrun by the logical implementation (the proxied contract).bytes32internalconstant CALL_PROXY_IMPL_SLOT =0x7184681641399eb4ad2fdb92114857ee6ff239f94ad635a1779978947b8843be;
// This storage slot stores the finalization flag.// Once the value stored in this slot is set to non-zero// the proxy blocks implementation upgrades.// The current implementation is then referred to as Finalized.// Web3.solidityKeccak(['string'], ["StarkWare2019.finalization-flag-slot"]).bytes32internalconstant FINALIZED_STATE_SLOT =0x7d433c6f837e8f93009937c466c82efbb5ba621fae36886d0cac433c5d0aa7d2;
// Storage slot to hold the upgrade delay (time-lock).// The intention of this slot is to allow modification using an EIC.// Web3.solidityKeccak(['string'], ['StarkWare.Upgradibility.Delay.Slot']).bytes32publicconstant UPGRADE_DELAY_SLOT =0xc21dbb3089fcb2c4f4c6a67854ab4db2b0f233ea4b21b21f912d52d18fc5db1f;
}