Source Code

;; BNSx Extensions registry
;; 
;; A modified version of the `.executor-dao` framework

(use-trait proposal-trait .proposal-trait.proposal-trait)
(use-trait extension-trait .extension-trait.extension-trait)

(define-constant err-unauthorised (err u1000))
(define-constant err-already-executed (err u1001))
(define-constant err-invalid-extension (err u1002))

(define-data-var executive principal tx-sender)
(define-map executed-proposals principal uint)
(define-map extensions principal bool)
(define-map extension-roles { extension: principal, role: (string-ascii 10) } bool)

;; --- Authorisation check

;; #[allow(unchecked_params)]
(define-private (is-self-or-extension)
  (ok (asserts! (or (is-eq tx-sender (as-contract tx-sender)) (is-extension contract-caller)) err-unauthorised))
)

;; --- Extensions

;; #[allow(unchecked_params)]
(define-read-only (is-extension (extension principal))
  (default-to false (map-get? extensions extension))
)

(define-read-only (has-role (extension principal) (role (string-ascii 10)))
  (default-to false (map-get? extension-roles { extension: extension, role: role }))
)

(define-read-only (has-role-or-extension (extension principal) (role (string-ascii 10)))
  (or (is-extension extension) (has-role extension role) (is-eq extension (as-contract tx-sender)))
)

(define-private (set-extensions-iter (item {extension: principal, enabled: bool}))
  (begin
    (print {event: "extension", extension: (get extension item), enabled: (get enabled item)})
    ;; #[allow(unchecked_data)]
    (map-set extensions (get extension item) (get enabled item))
  )
)

(define-public (set-extensions (extension-list (list 200 {extension: principal, enabled: bool})))
  (begin
    (try! (is-self-or-extension))
    (ok (map set-extensions-iter extension-list))
  )
)

(define-private (set-roles-iter (item { extension: principal, role: (string-ascii 10), enabled: bool }))
  (begin
    (print (merge item { event: "role" }))
    ;; #[allow(unchecked_data)]
    (map-set extension-roles { extension: (get extension item), role: (get role item) } (get enabled item))
  )
)

(define-public (set-extension-roles (extension-list (list 200 { extension: principal, role: (string-ascii 10), enabled: bool })))
  (begin
    (try! (is-self-or-extension))
    (ok (map set-roles-iter extension-list))
  )
)

;; --- Proposals

(define-read-only (executed-at (proposal <proposal-trait>))
  (map-get? executed-proposals (contract-of proposal))
)

(define-public (execute (proposal <proposal-trait>) (sender principal))
  (begin
    (try! (is-self-or-extension))
    (asserts! (map-insert executed-proposals (contract-of proposal) block-height) err-already-executed)
    (print {event: "execute", proposal: proposal})
    (as-contract (contract-call? proposal execute sender))
  )
)

;; --- Bootstrap

(define-public (construct (proposal <proposal-trait>))
  (let ((sender tx-sender))
    (asserts! (is-eq sender (var-get executive)) err-unauthorised)
    (var-set executive (as-contract tx-sender))
    (as-contract (execute proposal sender))
  )
)

;; --- Extension requests

(define-public (request-extension-callback (extension <extension-trait>) (memo (buff 34)))
  (let ((sender tx-sender))
    (asserts! (is-extension contract-caller) err-invalid-extension)
    (asserts! (is-eq contract-caller (contract-of extension)) err-invalid-extension)
    (as-contract (contract-call? extension callback sender memo))
  )
)

Functions (10)

FunctionAccessArgs
is-self-or-extensionprivate
is-extensionread-onlyextension: principal
has-roleread-onlyextension: principal, role: (string-ascii 10
has-role-or-extensionread-onlyextension: principal, role: (string-ascii 10
set-extensions-iterprivateitem: {extension: principal, enabled: bool}
set-extensionspublicextension-list: (list 200 {extension: principal, enabled: bool}
executed-atread-onlyproposal: <proposal-trait>
executepublicproposal: <proposal-trait>, sender: principal
constructpublicproposal: <proposal-trait>
request-extension-callbackpublicextension: <extension-trait>, memo: (buff 34