// SPDX-License-Identifier: LGPL-3.0-onlypragmasolidity >=0.7.0 <0.9.0;/// @title Enum - Collection of enums/// @author Richard Meissner - <richard@gnosis.pm>contractEnum{
enumOperation {Call, DelegateCall}
}
Contract Source Code
File 2 of 15: EtherPaymentFallback.sol
// SPDX-License-Identifier: LGPL-3.0-onlypragmasolidity >=0.7.0 <0.9.0;/// @title EtherPaymentFallback - A contract that has a fallback to accept ether payments/// @author Richard Meissner - <richard@gnosis.pm>contractEtherPaymentFallback{
eventSafeReceived(addressindexed sender, uint256 value);
/// @dev Fallback function accepts Ether transactions.receive() externalpayable{
emit SafeReceived(msg.sender, msg.value);
}
}
Contract Source Code
File 3 of 15: Executor.sol
// SPDX-License-Identifier: LGPL-3.0-onlypragmasolidity >=0.7.0 <0.9.0;import"../common/Enum.sol";
/// @title Executor - A contract that can execute transactions/// @author Richard Meissner - <richard@gnosis.pm>contractExecutor{
functionexecute(address to,
uint256 value,
bytesmemory data,
Enum.Operation operation,
uint256 txGas
) internalreturns (bool success) {
if (operation == Enum.Operation.DelegateCall) {
// solhint-disable-next-line no-inline-assemblyassembly {
success :=delegatecall(txGas, to, add(data, 0x20), mload(data), 0, 0)
}
} else {
// solhint-disable-next-line no-inline-assemblyassembly {
success :=call(txGas, to, value, add(data, 0x20), mload(data), 0, 0)
}
}
}
}
Contract Source Code
File 4 of 15: FallbackManager.sol
// SPDX-License-Identifier: LGPL-3.0-onlypragmasolidity >=0.7.0 <0.9.0;import"../common/SelfAuthorized.sol";
/// @title Fallback Manager - A contract that manages fallback calls made to this contract/// @author Richard Meissner - <richard@gnosis.pm>contractFallbackManagerisSelfAuthorized{
eventChangedFallbackHandler(address handler);
// keccak256("fallback_manager.handler.address")bytes32internalconstant FALLBACK_HANDLER_STORAGE_SLOT =0x6c9a6c4a39284e37ed1cf53d337577d14212a4870fb976a4366c693b939918d5;
functioninternalSetFallbackHandler(address handler) internal{
bytes32 slot = FALLBACK_HANDLER_STORAGE_SLOT;
// solhint-disable-next-line no-inline-assemblyassembly {
sstore(slot, handler)
}
}
/// @dev Allows to add a contract to handle fallback calls./// Only fallback calls without value and with data will be forwarded./// This can only be done via a Safe transaction./// @param handler contract to handle fallbacks calls.functionsetFallbackHandler(address handler) publicauthorized{
internalSetFallbackHandler(handler);
emit ChangedFallbackHandler(handler);
}
// solhint-disable-next-line payable-fallback,no-complex-fallbackfallback() external{
bytes32 slot = FALLBACK_HANDLER_STORAGE_SLOT;
// solhint-disable-next-line no-inline-assemblyassembly {
let handler :=sload(slot)
ifiszero(handler) {
return(0, 0)
}
calldatacopy(0, 0, calldatasize())
// The msg.sender address is shifted to the left by 12 bytes to remove the padding// Then the address without padding is stored right after the calldatamstore(calldatasize(), shl(96, caller()))
// Add 20 bytes for the address appended add the endlet success :=call(gas(), handler, 0, 0, add(calldatasize(), 20), 0, 0)
returndatacopy(0, 0, returndatasize())
ifiszero(success) {
revert(0, returndatasize())
}
return(0, returndatasize())
}
}
}
Contract Source Code
File 5 of 15: GnosisSafe.sol
// SPDX-License-Identifier: LGPL-3.0-onlypragmasolidity >=0.7.0 <0.9.0;import"./base/ModuleManager.sol";
import"./base/OwnerManager.sol";
import"./base/FallbackManager.sol";
import"./base/GuardManager.sol";
import"./common/EtherPaymentFallback.sol";
import"./common/Singleton.sol";
import"./common/SignatureDecoder.sol";
import"./common/SecuredTokenTransfer.sol";
import"./common/StorageAccessible.sol";
import"./interfaces/ISignatureValidator.sol";
import"./external/GnosisSafeMath.sol";
/// @title Gnosis Safe - A multisignature wallet with support for confirmations using signed messages based on ERC191./// @author Stefan George - <stefan@gnosis.io>/// @author Richard Meissner - <richard@gnosis.io>contractGnosisSafeisEtherPaymentFallback,
Singleton,
ModuleManager,
OwnerManager,
SignatureDecoder,
SecuredTokenTransfer,
ISignatureValidatorConstants,
FallbackManager,
StorageAccessible,
GuardManager{
usingGnosisSafeMathforuint256;
stringpublicconstant VERSION ="1.3.0";
// keccak256(// "EIP712Domain(uint256 chainId,address verifyingContract)"// );bytes32privateconstant DOMAIN_SEPARATOR_TYPEHASH =0x47e79534a245952e8b16893a336b85a3d9ea9fa8c573f3d803afb92a79469218;
// keccak256(// "SafeTx(address to,uint256 value,bytes data,uint8 operation,uint256 safeTxGas,uint256 baseGas,uint256 gasPrice,address gasToken,address refundReceiver,uint256 nonce)"// );bytes32privateconstant SAFE_TX_TYPEHASH =0xbb8310d486368db6bd6f849402fdd73ad53d316b5a4b2644ad6efe0f941286d8;
eventSafeSetup(addressindexed initiator, address[] owners, uint256 threshold, address initializer, address fallbackHandler);
eventApproveHash(bytes32indexed approvedHash, addressindexed owner);
eventSignMsg(bytes32indexed msgHash);
eventExecutionFailure(bytes32 txHash, uint256 payment);
eventExecutionSuccess(bytes32 txHash, uint256 payment);
uint256public nonce;
bytes32private _deprecatedDomainSeparator;
// Mapping to keep track of all message hashes that have been approve by ALL REQUIRED ownersmapping(bytes32=>uint256) public signedMessages;
// Mapping to keep track of all hashes (message or transaction) that have been approve by ANY ownersmapping(address=>mapping(bytes32=>uint256)) public approvedHashes;
// This constructor ensures that this contract can only be used as a master copy for Proxy contractsconstructor() {
// By setting the threshold it is not possible to call setup anymore,// so we create a Safe with 0 owners and threshold 1.// This is an unusable Safe, perfect for the singleton
threshold =1;
}
/// @dev Setup function sets initial storage of contract./// @param _owners List of Safe owners./// @param _threshold Number of required confirmations for a Safe transaction./// @param to Contract address for optional delegate call./// @param data Data payload for optional delegate call./// @param fallbackHandler Handler for fallback calls to this contract/// @param paymentToken Token that should be used for the payment (0 is ETH)/// @param payment Value that should be paid/// @param paymentReceiver Adddress that should receive the payment (or 0 if tx.origin)functionsetup(address[] calldata _owners,
uint256 _threshold,
address to,
bytescalldata data,
address fallbackHandler,
address paymentToken,
uint256 payment,
addresspayable paymentReceiver
) external{
// setupOwners checks if the Threshold is already set, therefore preventing that this method is called twice
setupOwners(_owners, _threshold);
if (fallbackHandler !=address(0)) internalSetFallbackHandler(fallbackHandler);
// As setupOwners can only be called if the contract has not been initialized we don't need a check for setupModules
setupModules(to, data);
if (payment >0) {
// To avoid running into issues with EIP-170 we reuse the handlePayment function (to avoid adjusting code of that has been verified we do not adjust the method itself)// baseGas = 0, gasPrice = 1 and gas = payment => amount = (payment + 0) * 1 = payment
handlePayment(payment, 0, 1, paymentToken, paymentReceiver);
}
emit SafeSetup(msg.sender, _owners, _threshold, to, fallbackHandler);
}
/// @dev Allows to execute a Safe transaction confirmed by required number of owners and then pays the account that submitted the transaction./// Note: The fees are always transferred, even if the user transaction fails./// @param to Destination address of Safe transaction./// @param value Ether value of Safe transaction./// @param data Data payload of Safe transaction./// @param operation Operation type of Safe transaction./// @param safeTxGas Gas that should be used for the Safe transaction./// @param baseGas Gas costs that are independent of the transaction execution(e.g. base transaction fee, signature check, payment of the refund)/// @param gasPrice Gas price that should be used for the payment calculation./// @param gasToken Token address (or 0 if ETH) that is used for the payment./// @param refundReceiver Address of receiver of gas payment (or 0 if tx.origin)./// @param signatures Packed signature data ({bytes32 r}{bytes32 s}{uint8 v})functionexecTransaction(address to,
uint256 value,
bytescalldata data,
Enum.Operation operation,
uint256 safeTxGas,
uint256 baseGas,
uint256 gasPrice,
address gasToken,
addresspayable refundReceiver,
bytesmemory signatures
) publicpayablevirtualreturns (bool success) {
bytes32 txHash;
// Use scope here to limit variable lifetime and prevent `stack too deep` errors
{
bytesmemory txHashData =
encodeTransactionData(
// Transaction info
to,
value,
data,
operation,
safeTxGas,
// Payment info
baseGas,
gasPrice,
gasToken,
refundReceiver,
// Signature info
nonce
);
// Increase nonce and execute transaction.
nonce++;
txHash =keccak256(txHashData);
checkSignatures(txHash, txHashData, signatures);
}
address guard = getGuard();
{
if (guard !=address(0)) {
Guard(guard).checkTransaction(
// Transaction info
to,
value,
data,
operation,
safeTxGas,
// Payment info
baseGas,
gasPrice,
gasToken,
refundReceiver,
// Signature info
signatures,
msg.sender
);
}
}
// We require some gas to emit the events (at least 2500) after the execution and some to perform code until the execution (500)// We also include the 1/64 in the check that is not send along with a call to counteract potential shortings because of EIP-150require(gasleft() >= ((safeTxGas *64) /63).max(safeTxGas +2500) +500, "GS010");
// Use scope here to limit variable lifetime and prevent `stack too deep` errors
{
uint256 gasUsed =gasleft();
// If the gasPrice is 0 we assume that nearly all available gas can be used (it is always more than safeTxGas)// We only substract 2500 (compared to the 3000 before) to ensure that the amount passed is still higher than safeTxGas
success = execute(to, value, data, operation, gasPrice ==0 ? (gasleft() -2500) : safeTxGas);
gasUsed = gasUsed.sub(gasleft());
// If no safeTxGas and no gasPrice was set (e.g. both are 0), then the internal tx is required to be successful// This makes it possible to use `estimateGas` without issues, as it searches for the minimum gas where the tx doesn't revertrequire(success || safeTxGas !=0|| gasPrice !=0, "GS013");
// We transfer the calculated tx costs to the tx.origin to avoid sending it to intermediate contracts that have made callsuint256 payment =0;
if (gasPrice >0) {
payment = handlePayment(gasUsed, baseGas, gasPrice, gasToken, refundReceiver);
}
if (success) emit ExecutionSuccess(txHash, payment);
elseemit ExecutionFailure(txHash, payment);
}
{
if (guard !=address(0)) {
Guard(guard).checkAfterExecution(txHash, success);
}
}
}
functionhandlePayment(uint256 gasUsed,
uint256 baseGas,
uint256 gasPrice,
address gasToken,
addresspayable refundReceiver
) privatereturns (uint256 payment) {
// solhint-disable-next-line avoid-tx-originaddresspayable receiver = refundReceiver ==address(0) ? payable(tx.origin) : refundReceiver;
if (gasToken ==address(0)) {
// For ETH we will only adjust the gas price to not be higher than the actual used gas price
payment = gasUsed.add(baseGas).mul(gasPrice <tx.gasprice ? gasPrice : tx.gasprice);
require(receiver.send(payment), "GS011");
} else {
payment = gasUsed.add(baseGas).mul(gasPrice);
require(transferToken(gasToken, receiver, payment), "GS012");
}
}
/**
* @dev Checks whether the signature provided is valid for the provided data, hash. Will revert otherwise.
* @param dataHash Hash of the data (could be either a message hash or transaction hash)
* @param data That should be signed (this is passed to an external validator contract)
* @param signatures Signature data that should be verified. Can be ECDSA signature, contract signature (EIP-1271) or approved hash.
*/functioncheckSignatures(bytes32 dataHash,
bytesmemory data,
bytesmemory signatures
) publicview{
// Load threshold to avoid multiple storage loadsuint256 _threshold = threshold;
// Check that a threshold is setrequire(_threshold >0, "GS001");
checkNSignatures(dataHash, data, signatures, _threshold);
}
/**
* @dev Checks whether the signature provided is valid for the provided data, hash. Will revert otherwise.
* @param dataHash Hash of the data (could be either a message hash or transaction hash)
* @param data That should be signed (this is passed to an external validator contract)
* @param signatures Signature data that should be verified. Can be ECDSA signature, contract signature (EIP-1271) or approved hash.
* @param requiredSignatures Amount of required valid signatures.
*/functioncheckNSignatures(bytes32 dataHash,
bytesmemory data,
bytesmemory signatures,
uint256 requiredSignatures
) publicview{
// Check that the provided signature data is not too shortrequire(signatures.length>= requiredSignatures.mul(65), "GS020");
// There cannot be an owner with address 0.address lastOwner =address(0);
address currentOwner;
uint8 v;
bytes32 r;
bytes32 s;
uint256 i;
for (i =0; i < requiredSignatures; i++) {
(v, r, s) = signatureSplit(signatures, i);
if (v ==0) {
// If v is 0 then it is a contract signature// When handling contract signatures the address of the contract is encoded into r
currentOwner =address(uint160(uint256(r)));
// Check that signature data pointer (s) is not pointing inside the static part of the signatures bytes// This check is not completely accurate, since it is possible that more signatures than the threshold are send.// Here we only check that the pointer is not pointing inside the part that is being processedrequire(uint256(s) >= requiredSignatures.mul(65), "GS021");
// Check that signature data pointer (s) is in bounds (points to the length of data -> 32 bytes)require(uint256(s).add(32) <= signatures.length, "GS022");
// Check if the contract signature is in bounds: start of data is s + 32 and end is start + signature lengthuint256 contractSignatureLen;
// solhint-disable-next-line no-inline-assemblyassembly {
contractSignatureLen :=mload(add(add(signatures, s), 0x20))
}
require(uint256(s).add(32).add(contractSignatureLen) <= signatures.length, "GS023");
// Check signaturebytesmemory contractSignature;
// solhint-disable-next-line no-inline-assemblyassembly {
// The signature data for contract signatures is appended to the concatenated signatures and the offset is stored in s
contractSignature :=add(add(signatures, s), 0x20)
}
require(ISignatureValidator(currentOwner).isValidSignature(data, contractSignature) == EIP1271_MAGIC_VALUE, "GS024");
} elseif (v ==1) {
// If v is 1 then it is an approved hash// When handling approved hashes the address of the approver is encoded into r
currentOwner =address(uint160(uint256(r)));
// Hashes are automatically approved by the sender of the message or when they have been pre-approved via a separate transactionrequire(msg.sender== currentOwner || approvedHashes[currentOwner][dataHash] !=0, "GS025");
} elseif (v >30) {
// If v > 30 then default va (27,28) has been adjusted for eth_sign flow// To support eth_sign and similar we adjust v and hash the messageHash with the Ethereum message prefix before applying ecrecover
currentOwner =ecrecover(keccak256(abi.encodePacked("\x19Ethereum Signed Message:\n32", dataHash)), v -4, r, s);
} else {
// Default is the ecrecover flow with the provided data hash// Use ecrecover with the messageHash for EOA signatures
currentOwner =ecrecover(dataHash, v, r, s);
}
require(currentOwner > lastOwner && owners[currentOwner] !=address(0) && currentOwner != SENTINEL_OWNERS, "GS026");
lastOwner = currentOwner;
}
}
/// @dev Allows to estimate a Safe transaction./// This method is only meant for estimation purpose, therefore the call will always revert and encode the result in the revert data./// Since the `estimateGas` function includes refunds, call this method to get an estimated of the costs that are deducted from the safe with `execTransaction`/// @param to Destination address of Safe transaction./// @param value Ether value of Safe transaction./// @param data Data payload of Safe transaction./// @param operation Operation type of Safe transaction./// @return Estimate without refunds and overhead fees (base transaction and payload data gas costs)./// @notice Deprecated in favor of common/StorageAccessible.sol and will be removed in next version.functionrequiredTxGas(address to,
uint256 value,
bytescalldata data,
Enum.Operation operation
) externalreturns (uint256) {
uint256 startGas =gasleft();
// We don't provide an error message here, as we use it to return the estimaterequire(execute(to, value, data, operation, gasleft()));
uint256 requiredGas = startGas -gasleft();
// Convert response to string and return via error messagerevert(string(abi.encodePacked(requiredGas)));
}
/**
* @dev Marks a hash as approved. This can be used to validate a hash that is used by a signature.
* @param hashToApprove The hash that should be marked as approved for signatures that are verified by this contract.
*/functionapproveHash(bytes32 hashToApprove) external{
require(owners[msg.sender] !=address(0), "GS030");
approvedHashes[msg.sender][hashToApprove] =1;
emit ApproveHash(hashToApprove, msg.sender);
}
/// @dev Returns the chain id used by this contract.functiongetChainId() publicviewreturns (uint256) {
uint256 id;
// solhint-disable-next-line no-inline-assemblyassembly {
id :=chainid()
}
return id;
}
functiondomainSeparator() publicviewreturns (bytes32) {
returnkeccak256(abi.encode(DOMAIN_SEPARATOR_TYPEHASH, getChainId(), this));
}
/// @dev Returns the bytes that are hashed to be signed by owners./// @param to Destination address./// @param value Ether value./// @param data Data payload./// @param operation Operation type./// @param safeTxGas Gas that should be used for the safe transaction./// @param baseGas Gas costs for that are independent of the transaction execution(e.g. base transaction fee, signature check, payment of the refund)/// @param gasPrice Maximum gas price that should be used for this transaction./// @param gasToken Token address (or 0 if ETH) that is used for the payment./// @param refundReceiver Address of receiver of gas payment (or 0 if tx.origin)./// @param _nonce Transaction nonce./// @return Transaction hash bytes.functionencodeTransactionData(address to,
uint256 value,
bytescalldata data,
Enum.Operation operation,
uint256 safeTxGas,
uint256 baseGas,
uint256 gasPrice,
address gasToken,
address refundReceiver,
uint256 _nonce
) publicviewreturns (bytesmemory) {
bytes32 safeTxHash =keccak256(
abi.encode(
SAFE_TX_TYPEHASH,
to,
value,
keccak256(data),
operation,
safeTxGas,
baseGas,
gasPrice,
gasToken,
refundReceiver,
_nonce
)
);
returnabi.encodePacked(bytes1(0x19), bytes1(0x01), domainSeparator(), safeTxHash);
}
/// @dev Returns hash to be signed by owners./// @param to Destination address./// @param value Ether value./// @param data Data payload./// @param operation Operation type./// @param safeTxGas Fas that should be used for the safe transaction./// @param baseGas Gas costs for data used to trigger the safe transaction./// @param gasPrice Maximum gas price that should be used for this transaction./// @param gasToken Token address (or 0 if ETH) that is used for the payment./// @param refundReceiver Address of receiver of gas payment (or 0 if tx.origin)./// @param _nonce Transaction nonce./// @return Transaction hash.functiongetTransactionHash(address to,
uint256 value,
bytescalldata data,
Enum.Operation operation,
uint256 safeTxGas,
uint256 baseGas,
uint256 gasPrice,
address gasToken,
address refundReceiver,
uint256 _nonce
) publicviewreturns (bytes32) {
returnkeccak256(encodeTransactionData(to, value, data, operation, safeTxGas, baseGas, gasPrice, gasToken, refundReceiver, _nonce));
}
}
Contract Source Code
File 6 of 15: GnosisSafeMath.sol
// SPDX-License-Identifier: LGPL-3.0-onlypragmasolidity >=0.7.0 <0.9.0;/**
* @title GnosisSafeMath
* @dev Math operations with safety checks that revert on error
* Renamed from SafeMath to GnosisSafeMath to avoid conflicts
* TODO: remove once open zeppelin update to solc 0.5.0
*/libraryGnosisSafeMath{
/**
* @dev Multiplies two numbers, reverts on overflow.
*/functionmul(uint256 a, uint256 b) internalpurereturns (uint256) {
// Gas optimization: this is cheaper than requiring 'a' not being zero, but the// benefit is lost if 'b' is also tested.// See: https://github.com/OpenZeppelin/openzeppelin-solidity/pull/522if (a ==0) {
return0;
}
uint256 c = a * b;
require(c / a == b);
return c;
}
/**
* @dev Subtracts two numbers, reverts on overflow (i.e. if subtrahend is greater than minuend).
*/functionsub(uint256 a, uint256 b) internalpurereturns (uint256) {
require(b <= a);
uint256 c = a - b;
return c;
}
/**
* @dev Adds two numbers, reverts on overflow.
*/functionadd(uint256 a, uint256 b) internalpurereturns (uint256) {
uint256 c = a + b;
require(c >= a);
return c;
}
/**
* @dev Returns the largest of two numbers.
*/functionmax(uint256 a, uint256 b) internalpurereturns (uint256) {
return a >= b ? a : b;
}
}
Contract Source Code
File 7 of 15: GuardManager.sol
// SPDX-License-Identifier: LGPL-3.0-onlypragmasolidity >=0.7.0 <0.9.0;import"../common/Enum.sol";
import"../common/SelfAuthorized.sol";
interfaceGuard{
functioncheckTransaction(address to,
uint256 value,
bytesmemory data,
Enum.Operation operation,
uint256 safeTxGas,
uint256 baseGas,
uint256 gasPrice,
address gasToken,
addresspayable refundReceiver,
bytesmemory signatures,
address msgSender
) external;
functioncheckAfterExecution(bytes32 txHash, bool success) external;
}
/// @title Fallback Manager - A contract that manages fallback calls made to this contract/// @author Richard Meissner - <richard@gnosis.pm>contractGuardManagerisSelfAuthorized{
eventChangedGuard(address guard);
// keccak256("guard_manager.guard.address")bytes32internalconstant GUARD_STORAGE_SLOT =0x4a204f620c8c5ccdca3fd54d003badd85ba500436a431f0cbda4f558c93c34c8;
/// @dev Set a guard that checks transactions before execution/// @param guard The address of the guard to be used or the 0 address to disable the guardfunctionsetGuard(address guard) externalauthorized{
bytes32 slot = GUARD_STORAGE_SLOT;
// solhint-disable-next-line no-inline-assemblyassembly {
sstore(slot, guard)
}
emit ChangedGuard(guard);
}
functiongetGuard() internalviewreturns (address guard) {
bytes32 slot = GUARD_STORAGE_SLOT;
// solhint-disable-next-line no-inline-assemblyassembly {
guard :=sload(slot)
}
}
}
Contract Source Code
File 8 of 15: ISignatureValidator.sol
// SPDX-License-Identifier: LGPL-3.0-onlypragmasolidity >=0.7.0 <0.9.0;contractISignatureValidatorConstants{
// bytes4(keccak256("isValidSignature(bytes,bytes)")bytes4internalconstant EIP1271_MAGIC_VALUE =0x20c13b0b;
}
abstractcontractISignatureValidatorisISignatureValidatorConstants{
/**
* @dev Should return whether the signature provided is valid for the provided data
* @param _data Arbitrary length data signed on the behalf of address(this)
* @param _signature Signature byte array associated with _data
*
* MUST return the bytes4 magic value 0x20c13b0b when function passes.
* MUST NOT modify state (using STATICCALL for solc < 0.5, view modifier for solc > 0.5)
* MUST allow external calls
*/functionisValidSignature(bytesmemory _data, bytesmemory _signature) publicviewvirtualreturns (bytes4);
}
Contract Source Code
File 9 of 15: ModuleManager.sol
// SPDX-License-Identifier: LGPL-3.0-onlypragmasolidity >=0.7.0 <0.9.0;import"../common/Enum.sol";
import"../common/SelfAuthorized.sol";
import"./Executor.sol";
/// @title Module Manager - A contract that manages modules that can execute transactions via this contract/// @author Stefan George - <stefan@gnosis.pm>/// @author Richard Meissner - <richard@gnosis.pm>contractModuleManagerisSelfAuthorized, Executor{
eventEnabledModule(address module);
eventDisabledModule(address module);
eventExecutionFromModuleSuccess(addressindexed module);
eventExecutionFromModuleFailure(addressindexed module);
addressinternalconstant SENTINEL_MODULES =address(0x1);
mapping(address=>address) internal modules;
functionsetupModules(address to, bytesmemory data) internal{
require(modules[SENTINEL_MODULES] ==address(0), "GS100");
modules[SENTINEL_MODULES] = SENTINEL_MODULES;
if (to !=address(0))
// Setup has to complete successfully or transaction fails.require(execute(to, 0, data, Enum.Operation.DelegateCall, gasleft()), "GS000");
}
/// @dev Allows to add a module to the whitelist./// This can only be done via a Safe transaction./// @notice Enables the module `module` for the Safe./// @param module Module to be whitelisted.functionenableModule(address module) publicauthorized{
// Module address cannot be null or sentinel.require(module !=address(0) && module != SENTINEL_MODULES, "GS101");
// Module cannot be added twice.require(modules[module] ==address(0), "GS102");
modules[module] = modules[SENTINEL_MODULES];
modules[SENTINEL_MODULES] = module;
emit EnabledModule(module);
}
/// @dev Allows to remove a module from the whitelist./// This can only be done via a Safe transaction./// @notice Disables the module `module` for the Safe./// @param prevModule Module that pointed to the module to be removed in the linked list/// @param module Module to be removed.functiondisableModule(address prevModule, address module) publicauthorized{
// Validate module address and check that it corresponds to module index.require(module !=address(0) && module != SENTINEL_MODULES, "GS101");
require(modules[prevModule] == module, "GS103");
modules[prevModule] = modules[module];
modules[module] =address(0);
emit DisabledModule(module);
}
/// @dev Allows a Module to execute a Safe transaction without any further confirmations./// @param to Destination address of module transaction./// @param value Ether value of module transaction./// @param data Data payload of module transaction./// @param operation Operation type of module transaction.functionexecTransactionFromModule(address to,
uint256 value,
bytesmemory data,
Enum.Operation operation
) publicvirtualreturns (bool success) {
// Only whitelisted modules are allowed.require(msg.sender!= SENTINEL_MODULES && modules[msg.sender] !=address(0), "GS104");
// Execute transaction without further confirmations.
success = execute(to, value, data, operation, gasleft());
if (success) emit ExecutionFromModuleSuccess(msg.sender);
elseemit ExecutionFromModuleFailure(msg.sender);
}
/// @dev Allows a Module to execute a Safe transaction without any further confirmations and return data/// @param to Destination address of module transaction./// @param value Ether value of module transaction./// @param data Data payload of module transaction./// @param operation Operation type of module transaction.functionexecTransactionFromModuleReturnData(address to,
uint256 value,
bytesmemory data,
Enum.Operation operation
) publicreturns (bool success, bytesmemory returnData) {
success = execTransactionFromModule(to, value, data, operation);
// solhint-disable-next-line no-inline-assemblyassembly {
// Load free memory locationlet ptr :=mload(0x40)
// We allocate memory for the return data by setting the free memory location to// current free memory location + data size + 32 bytes for data size valuemstore(0x40, add(ptr, add(returndatasize(), 0x20)))
// Store the sizemstore(ptr, returndatasize())
// Store the datareturndatacopy(add(ptr, 0x20), 0, returndatasize())
// Point the return data to the correct memory location
returnData := ptr
}
}
/// @dev Returns if an module is enabled/// @return True if the module is enabledfunctionisModuleEnabled(address module) publicviewreturns (bool) {
return SENTINEL_MODULES != module && modules[module] !=address(0);
}
/// @dev Returns array of modules./// @param start Start of the page./// @param pageSize Maximum number of modules that should be returned./// @return array Array of modules./// @return next Start of the next page.functiongetModulesPaginated(address start, uint256 pageSize) externalviewreturns (address[] memory array, address next) {
// Init array with max page size
array =newaddress[](pageSize);
// Populate return arrayuint256 moduleCount =0;
address currentModule = modules[start];
while (currentModule !=address(0x0) && currentModule != SENTINEL_MODULES && moduleCount < pageSize) {
array[moduleCount] = currentModule;
currentModule = modules[currentModule];
moduleCount++;
}
next = currentModule;
// Set correct size of returned array// solhint-disable-next-line no-inline-assemblyassembly {
mstore(array, moduleCount)
}
}
}
Contract Source Code
File 10 of 15: OwnerManager.sol
// SPDX-License-Identifier: LGPL-3.0-onlypragmasolidity >=0.7.0 <0.9.0;import"../common/SelfAuthorized.sol";
/// @title OwnerManager - Manages a set of owners and a threshold to perform actions./// @author Stefan George - <stefan@gnosis.pm>/// @author Richard Meissner - <richard@gnosis.pm>contractOwnerManagerisSelfAuthorized{
eventAddedOwner(address owner);
eventRemovedOwner(address owner);
eventChangedThreshold(uint256 threshold);
addressinternalconstant SENTINEL_OWNERS =address(0x1);
mapping(address=>address) internal owners;
uint256internal ownerCount;
uint256internal threshold;
/// @dev Setup function sets initial storage of contract./// @param _owners List of Safe owners./// @param _threshold Number of required confirmations for a Safe transaction.functionsetupOwners(address[] memory _owners, uint256 _threshold) internal{
// Threshold can only be 0 at initialization.// Check ensures that setup function can only be called once.require(threshold ==0, "GS200");
// Validate that threshold is smaller than number of added owners.require(_threshold <= _owners.length, "GS201");
// There has to be at least one Safe owner.require(_threshold >=1, "GS202");
// Initializing Safe owners.address currentOwner = SENTINEL_OWNERS;
for (uint256 i =0; i < _owners.length; i++) {
// Owner address cannot be null.address owner = _owners[i];
require(owner !=address(0) && owner != SENTINEL_OWNERS && owner !=address(this) && currentOwner != owner, "GS203");
// No duplicate owners allowed.require(owners[owner] ==address(0), "GS204");
owners[currentOwner] = owner;
currentOwner = owner;
}
owners[currentOwner] = SENTINEL_OWNERS;
ownerCount = _owners.length;
threshold = _threshold;
}
/// @dev Allows to add a new owner to the Safe and update the threshold at the same time./// This can only be done via a Safe transaction./// @notice Adds the owner `owner` to the Safe and updates the threshold to `_threshold`./// @param owner New owner address./// @param _threshold New threshold.functionaddOwnerWithThreshold(address owner, uint256 _threshold) publicauthorized{
// Owner address cannot be null, the sentinel or the Safe itself.require(owner !=address(0) && owner != SENTINEL_OWNERS && owner !=address(this), "GS203");
// No duplicate owners allowed.require(owners[owner] ==address(0), "GS204");
owners[owner] = owners[SENTINEL_OWNERS];
owners[SENTINEL_OWNERS] = owner;
ownerCount++;
emit AddedOwner(owner);
// Change threshold if threshold was changed.if (threshold != _threshold) changeThreshold(_threshold);
}
/// @dev Allows to remove an owner from the Safe and update the threshold at the same time./// This can only be done via a Safe transaction./// @notice Removes the owner `owner` from the Safe and updates the threshold to `_threshold`./// @param prevOwner Owner that pointed to the owner to be removed in the linked list/// @param owner Owner address to be removed./// @param _threshold New threshold.functionremoveOwner(address prevOwner,
address owner,
uint256 _threshold
) publicauthorized{
// Only allow to remove an owner, if threshold can still be reached.require(ownerCount -1>= _threshold, "GS201");
// Validate owner address and check that it corresponds to owner index.require(owner !=address(0) && owner != SENTINEL_OWNERS, "GS203");
require(owners[prevOwner] == owner, "GS205");
owners[prevOwner] = owners[owner];
owners[owner] =address(0);
ownerCount--;
emit RemovedOwner(owner);
// Change threshold if threshold was changed.if (threshold != _threshold) changeThreshold(_threshold);
}
/// @dev Allows to swap/replace an owner from the Safe with another address./// This can only be done via a Safe transaction./// @notice Replaces the owner `oldOwner` in the Safe with `newOwner`./// @param prevOwner Owner that pointed to the owner to be replaced in the linked list/// @param oldOwner Owner address to be replaced./// @param newOwner New owner address.functionswapOwner(address prevOwner,
address oldOwner,
address newOwner
) publicauthorized{
// Owner address cannot be null, the sentinel or the Safe itself.require(newOwner !=address(0) && newOwner != SENTINEL_OWNERS && newOwner !=address(this), "GS203");
// No duplicate owners allowed.require(owners[newOwner] ==address(0), "GS204");
// Validate oldOwner address and check that it corresponds to owner index.require(oldOwner !=address(0) && oldOwner != SENTINEL_OWNERS, "GS203");
require(owners[prevOwner] == oldOwner, "GS205");
owners[newOwner] = owners[oldOwner];
owners[prevOwner] = newOwner;
owners[oldOwner] =address(0);
emit RemovedOwner(oldOwner);
emit AddedOwner(newOwner);
}
/// @dev Allows to update the number of required confirmations by Safe owners./// This can only be done via a Safe transaction./// @notice Changes the threshold of the Safe to `_threshold`./// @param _threshold New threshold.functionchangeThreshold(uint256 _threshold) publicauthorized{
// Validate that threshold is smaller than number of owners.require(_threshold <= ownerCount, "GS201");
// There has to be at least one Safe owner.require(_threshold >=1, "GS202");
threshold = _threshold;
emit ChangedThreshold(threshold);
}
functiongetThreshold() publicviewreturns (uint256) {
return threshold;
}
functionisOwner(address owner) publicviewreturns (bool) {
return owner != SENTINEL_OWNERS && owners[owner] !=address(0);
}
/// @dev Returns array of owners./// @return Array of Safe owners.functiongetOwners() publicviewreturns (address[] memory) {
address[] memory array =newaddress[](ownerCount);
// populate return arrayuint256 index =0;
address currentOwner = owners[SENTINEL_OWNERS];
while (currentOwner != SENTINEL_OWNERS) {
array[index] = currentOwner;
currentOwner = owners[currentOwner];
index++;
}
return array;
}
}
Contract Source Code
File 11 of 15: SecuredTokenTransfer.sol
// SPDX-License-Identifier: LGPL-3.0-onlypragmasolidity >=0.7.0 <0.9.0;/// @title SecuredTokenTransfer - Secure token transfer/// @author Richard Meissner - <richard@gnosis.pm>contractSecuredTokenTransfer{
/// @dev Transfers a token and returns if it was a success/// @param token Token that should be transferred/// @param receiver Receiver to whom the token should be transferred/// @param amount The amount of tokens that should be transferredfunctiontransferToken(address token,
address receiver,
uint256 amount
) internalreturns (bool transferred) {
// 0xa9059cbb - keccack("transfer(address,uint256)")bytesmemory data =abi.encodeWithSelector(0xa9059cbb, receiver, amount);
// solhint-disable-next-line no-inline-assemblyassembly {
// We write the return value to scratch space.// See https://docs.soliditylang.org/en/v0.7.6/internals/layout_in_memory.html#layout-in-memorylet success :=call(sub(gas(), 10000), token, 0, add(data, 0x20), mload(data), 0, 0x20)
switchreturndatasize()
case0 {
transferred := success
}
case0x20 {
transferred :=iszero(or(iszero(success), iszero(mload(0))))
}
default {
transferred :=0
}
}
}
}
Contract Source Code
File 12 of 15: SelfAuthorized.sol
// SPDX-License-Identifier: LGPL-3.0-onlypragmasolidity >=0.7.0 <0.9.0;/// @title SelfAuthorized - authorizes current contract to perform actions/// @author Richard Meissner - <richard@gnosis.pm>contractSelfAuthorized{
functionrequireSelfCall() privateview{
require(msg.sender==address(this), "GS031");
}
modifierauthorized() {
// This is a function call as it minimized the bytecode size
requireSelfCall();
_;
}
}
Contract Source Code
File 13 of 15: SignatureDecoder.sol
// SPDX-License-Identifier: LGPL-3.0-onlypragmasolidity >=0.7.0 <0.9.0;/// @title SignatureDecoder - Decodes signatures that a encoded as bytes/// @author Richard Meissner - <richard@gnosis.pm>contractSignatureDecoder{
/// @dev divides bytes signature into `uint8 v, bytes32 r, bytes32 s`./// @notice Make sure to peform a bounds check for @param pos, to avoid out of bounds access on @param signatures/// @param pos which signature to read. A prior bounds check of this parameter should be performed, to avoid out of bounds access/// @param signatures concatenated rsv signaturesfunctionsignatureSplit(bytesmemory signatures, uint256 pos)
internalpurereturns (uint8 v,
bytes32 r,
bytes32 s
)
{
// The signature format is a compact form of:// {bytes32 r}{bytes32 s}{uint8 v}// Compact means, uint8 is not padded to 32 bytes.// solhint-disable-next-line no-inline-assemblyassembly {
let signaturePos :=mul(0x41, pos)
r :=mload(add(signatures, add(signaturePos, 0x20)))
s :=mload(add(signatures, add(signaturePos, 0x40)))
// Here we are loading the last 32 bytes, including 31 bytes// of 's'. There is no 'mload8' to do this.//// 'byte' is not working due to the Solidity parser, so lets// use the second best option, 'and'
v :=and(mload(add(signatures, add(signaturePos, 0x41))), 0xff)
}
}
}
Contract Source Code
File 14 of 15: Singleton.sol
// SPDX-License-Identifier: LGPL-3.0-onlypragmasolidity >=0.7.0 <0.9.0;/// @title Singleton - Base for singleton contracts (should always be first super contract)/// This contract is tightly coupled to our proxy contract (see `proxies/GnosisSafeProxy.sol`)/// @author Richard Meissner - <richard@gnosis.io>contractSingleton{
// singleton always needs to be first declared variable, to ensure that it is at the same location as in the Proxy contract.// It should also always be ensured that the address is stored alone (uses a full word)addressprivate singleton;
}
Contract Source Code
File 15 of 15: StorageAccessible.sol
// SPDX-License-Identifier: LGPL-3.0-onlypragmasolidity >=0.7.0 <0.9.0;/// @title StorageAccessible - generic base contract that allows callers to access all internal storage./// @notice See https://github.com/gnosis/util-contracts/blob/bb5fe5fb5df6d8400998094fb1b32a178a47c3a1/contracts/StorageAccessible.solcontractStorageAccessible{
/**
* @dev Reads `length` bytes of storage in the currents contract
* @param offset - the offset in the current contract's storage in words to start reading from
* @param length - the number of words (32 bytes) of data to read
* @return the bytes that were read.
*/functiongetStorageAt(uint256 offset, uint256 length) publicviewreturns (bytesmemory) {
bytesmemory result =newbytes(length *32);
for (uint256 index =0; index < length; index++) {
// solhint-disable-next-line no-inline-assemblyassembly {
let word :=sload(add(offset, index))
mstore(add(add(result, 0x20), mul(index, 0x20)), word)
}
}
return result;
}
/**
* @dev Performs a delegetecall on a targetContract in the context of self.
* Internally reverts execution to avoid side effects (making it static).
*
* This method reverts with data equal to `abi.encode(bool(success), bytes(response))`.
* Specifically, the `returndata` after a call to this method will be:
* `success:bool || response.length:uint256 || response:bytes`.
*
* @param targetContract Address of the contract containing the code to execute.
* @param calldataPayload Calldata that should be sent to the target contract (encoded method name and arguments).
*/functionsimulateAndRevert(address targetContract, bytesmemory calldataPayload) external{
// solhint-disable-next-line no-inline-assemblyassembly {
let success :=delegatecall(gas(), targetContract, add(calldataPayload, 0x20), mload(calldataPayload), 0, 0)
mstore(0x00, success)
mstore(0x20, returndatasize())
returndatacopy(0x40, 0, returndatasize())
revert(0, add(returndatasize(), 0x40))
}
}
}