Skip to content

Commit 8cb6c71

Browse files
authored
Eth 228 contract prod deployment artifacts (#158)
* recreate network json and upgrade local sidechain * pre prod upgrade * after deployment, pending! * cleanup
1 parent adcc24f commit 8cb6c71

File tree

2 files changed

+366
-1
lines changed

2 files changed

+366
-1
lines changed

.gitignore

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@
44
/packages/smartcontracts/bin/
55
/packages/smartcontracts/artifacts/
66
/packages/smartcontracts/typechain/
7-
/packages/smartcontracts/.openzeppelin/
87
/packages/brubeck-migration-script/artifacts
98
/packages/brubeck-migration-script/typechain
109
/bin/
Lines changed: 366 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,366 @@
1+
{
2+
"manifestVersion": "3.2",
3+
"proxies": [
4+
{
5+
"address": "0x0D483E10612F327FC11965Fc82E90dC19b141641",
6+
"txHash": "0x158db1237d86b145869e54a64d102fdef4b2c616f8d883367f20d8acc1b1f27e",
7+
"kind": "uups"
8+
}
9+
],
10+
"impls": {
11+
"51c029503bc7c54fd7002c209e57b2ed8825d8b6444e059a6c7021850cba9162": {
12+
"address": "0x63290C3cbb6Cc56D69e03d06038456d0a4b68D9b",
13+
"txHash": "0xaffb6fed19f51a2dd29c689321ae7102f0b81ca557b348764fedfaa5f5995c07",
14+
"layout": {
15+
"storage": [
16+
{
17+
"contract": "Initializable",
18+
"label": "_initialized",
19+
"type": "t_bool",
20+
"src": "@openzeppelin/contracts-upgradeable/proxy/utils/Initializable.sol:39"
21+
},
22+
{
23+
"contract": "Initializable",
24+
"label": "_initializing",
25+
"type": "t_bool",
26+
"src": "@openzeppelin/contracts-upgradeable/proxy/utils/Initializable.sol:44"
27+
},
28+
{
29+
"contract": "ERC1967UpgradeUpgradeable",
30+
"label": "__gap",
31+
"type": "t_array(t_uint256)50_storage",
32+
"src": "@openzeppelin/contracts-upgradeable/proxy/ERC1967/ERC1967UpgradeUpgradeable.sol:215"
33+
},
34+
{
35+
"contract": "UUPSUpgradeable",
36+
"label": "__gap",
37+
"type": "t_array(t_uint256)50_storage",
38+
"src": "@openzeppelin/contracts-upgradeable/proxy/utils/UUPSUpgradeable.sol:81"
39+
},
40+
{
41+
"contract": "ContextUpgradeable",
42+
"label": "__gap",
43+
"type": "t_array(t_uint256)50_storage",
44+
"src": "@openzeppelin/contracts-upgradeable/utils/ContextUpgradeable.sol:31"
45+
},
46+
{
47+
"contract": "ERC2771ContextUpgradeable",
48+
"label": "_trustedForwarder",
49+
"type": "t_address",
50+
"src": "@openzeppelin/contracts-upgradeable/metatx/ERC2771ContextUpgradeable.sol:13"
51+
},
52+
{
53+
"contract": "ERC2771ContextUpgradeable",
54+
"label": "__gap",
55+
"type": "t_array(t_uint256)49_storage",
56+
"src": "@openzeppelin/contracts-upgradeable/metatx/ERC2771ContextUpgradeable.sol:46"
57+
},
58+
{
59+
"contract": "ERC165Upgradeable",
60+
"label": "__gap",
61+
"type": "t_array(t_uint256)50_storage",
62+
"src": "@openzeppelin/contracts-upgradeable/utils/introspection/ERC165Upgradeable.sol:36"
63+
},
64+
{
65+
"contract": "AccessControlUpgradeable",
66+
"label": "_roles",
67+
"type": "t_mapping(t_bytes32,t_struct(RoleData)2219_storage)",
68+
"src": "@openzeppelin/contracts-upgradeable/access/AccessControlUpgradeable.sol:64"
69+
},
70+
{
71+
"contract": "AccessControlUpgradeable",
72+
"label": "__gap",
73+
"type": "t_array(t_uint256)49_storage",
74+
"src": "@openzeppelin/contracts-upgradeable/access/AccessControlUpgradeable.sol:232"
75+
},
76+
{
77+
"contract": "StreamRegistryV2",
78+
"label": "streamIdToPermissions",
79+
"type": "t_mapping(t_string_memory_ptr,t_mapping(t_bytes32,t_struct(Permission)8942_storage))",
80+
"src": "contracts/StreamRegistry/StreamRegistryV2.sol:39"
81+
},
82+
{
83+
"contract": "StreamRegistryV2",
84+
"label": "streamIdToMetadata",
85+
"type": "t_mapping(t_string_memory_ptr,t_string_storage)",
86+
"src": "contracts/StreamRegistry/StreamRegistryV2.sol:40"
87+
},
88+
{
89+
"contract": "StreamRegistryV2",
90+
"label": "ensCache",
91+
"type": "t_contract(ENSCache)13757",
92+
"src": "contracts/StreamRegistry/StreamRegistryV2.sol:41"
93+
},
94+
{
95+
"contract": "StreamRegistryV2",
96+
"label": "streamIdToVersion",
97+
"type": "t_mapping(t_string_memory_ptr,t_uint32)",
98+
"src": "contracts/StreamRegistry/StreamRegistryV2.sol:44"
99+
}
100+
],
101+
"types": {
102+
"t_mapping(t_string_memory_ptr,t_mapping(t_bytes32,t_struct(Permission)8942_storage))": {
103+
"label": "mapping(string => mapping(bytes32 => struct StreamRegistryV2.Permission))"
104+
},
105+
"t_string_storage": {
106+
"label": "string"
107+
},
108+
"t_mapping(t_bytes32,t_struct(Permission)8942_storage)": {
109+
"label": "mapping(bytes32 => struct StreamRegistryV2.Permission)"
110+
},
111+
"t_bytes32": {
112+
"label": "bytes32"
113+
},
114+
"t_struct(Permission)8942_storage": {
115+
"label": "struct StreamRegistryV2.Permission",
116+
"members": [
117+
{
118+
"label": "canEdit",
119+
"type": "t_bool"
120+
},
121+
{
122+
"label": "canDelete",
123+
"type": "t_bool"
124+
},
125+
{
126+
"label": "publishExpiration",
127+
"type": "t_uint256"
128+
},
129+
{
130+
"label": "subscribeExpiration",
131+
"type": "t_uint256"
132+
},
133+
{
134+
"label": "canGrant",
135+
"type": "t_bool"
136+
}
137+
]
138+
},
139+
"t_bool": {
140+
"label": "bool"
141+
},
142+
"t_uint256": {
143+
"label": "uint256"
144+
},
145+
"t_mapping(t_string_memory_ptr,t_string_storage)": {
146+
"label": "mapping(string => string)"
147+
},
148+
"t_contract(ENSCache)13757": {
149+
"label": "contract ENSCache"
150+
},
151+
"t_mapping(t_string_memory_ptr,t_uint32)": {
152+
"label": "mapping(string => uint32)"
153+
},
154+
"t_uint32": {
155+
"label": "uint32"
156+
},
157+
"t_mapping(t_bytes32,t_struct(RoleData)2219_storage)": {
158+
"label": "mapping(bytes32 => struct AccessControlUpgradeable.RoleData)"
159+
},
160+
"t_struct(RoleData)2219_storage": {
161+
"label": "struct AccessControlUpgradeable.RoleData",
162+
"members": [
163+
{
164+
"label": "members",
165+
"type": "t_mapping(t_address,t_bool)"
166+
},
167+
{
168+
"label": "adminRole",
169+
"type": "t_bytes32"
170+
}
171+
]
172+
},
173+
"t_mapping(t_address,t_bool)": {
174+
"label": "mapping(address => bool)"
175+
},
176+
"t_address": {
177+
"label": "address"
178+
},
179+
"t_array(t_uint256)49_storage": {
180+
"label": "uint256[49]"
181+
},
182+
"t_array(t_uint256)50_storage": {
183+
"label": "uint256[50]"
184+
}
185+
}
186+
}
187+
},
188+
"5540e8b077c4b3c584a6c07c6424f3d199bc02e8fb63f7e07a40386897d9787c": {
189+
"address": "0xb28f6c86fE2629d8DB751929d7932043d453109F",
190+
"txHash": "0x3260a35379f0924cc0a606b73a72a0d5865b91dc0f7220e4091102d5ce37a84b",
191+
"layout": {
192+
"storage": [
193+
{
194+
"contract": "Initializable",
195+
"label": "_initialized",
196+
"type": "t_bool",
197+
"src": "@openzeppelin/contracts-upgradeable/proxy/utils/Initializable.sol:39"
198+
},
199+
{
200+
"contract": "Initializable",
201+
"label": "_initializing",
202+
"type": "t_bool",
203+
"src": "@openzeppelin/contracts-upgradeable/proxy/utils/Initializable.sol:44"
204+
},
205+
{
206+
"contract": "ERC1967UpgradeUpgradeable",
207+
"label": "__gap",
208+
"type": "t_array(t_uint256)50_storage",
209+
"src": "@openzeppelin/contracts-upgradeable/proxy/ERC1967/ERC1967UpgradeUpgradeable.sol:215"
210+
},
211+
{
212+
"contract": "UUPSUpgradeable",
213+
"label": "__gap",
214+
"type": "t_array(t_uint256)50_storage",
215+
"src": "@openzeppelin/contracts-upgradeable/proxy/utils/UUPSUpgradeable.sol:81"
216+
},
217+
{
218+
"contract": "ContextUpgradeable",
219+
"label": "__gap",
220+
"type": "t_array(t_uint256)50_storage",
221+
"src": "@openzeppelin/contracts-upgradeable/utils/ContextUpgradeable.sol:31"
222+
},
223+
{
224+
"contract": "ERC2771ContextUpgradeable",
225+
"label": "_trustedForwarder",
226+
"type": "t_address",
227+
"src": "@openzeppelin/contracts-upgradeable/metatx/ERC2771ContextUpgradeable.sol:13"
228+
},
229+
{
230+
"contract": "ERC2771ContextUpgradeable",
231+
"label": "__gap",
232+
"type": "t_array(t_uint256)49_storage",
233+
"src": "@openzeppelin/contracts-upgradeable/metatx/ERC2771ContextUpgradeable.sol:46"
234+
},
235+
{
236+
"contract": "ERC165Upgradeable",
237+
"label": "__gap",
238+
"type": "t_array(t_uint256)50_storage",
239+
"src": "@openzeppelin/contracts-upgradeable/utils/introspection/ERC165Upgradeable.sol:36"
240+
},
241+
{
242+
"contract": "AccessControlUpgradeable",
243+
"label": "_roles",
244+
"type": "t_mapping(t_bytes32,t_struct(RoleData)2219_storage)",
245+
"src": "@openzeppelin/contracts-upgradeable/access/AccessControlUpgradeable.sol:64"
246+
},
247+
{
248+
"contract": "AccessControlUpgradeable",
249+
"label": "__gap",
250+
"type": "t_array(t_uint256)49_storage",
251+
"src": "@openzeppelin/contracts-upgradeable/access/AccessControlUpgradeable.sol:232"
252+
},
253+
{
254+
"contract": "StreamRegistryV3",
255+
"label": "streamIdToPermissions",
256+
"type": "t_mapping(t_string_memory_ptr,t_mapping(t_bytes32,t_struct(Permission)10857_storage))",
257+
"src": "contracts/StreamRegistry/StreamRegistryV3.sol:37"
258+
},
259+
{
260+
"contract": "StreamRegistryV3",
261+
"label": "streamIdToMetadata",
262+
"type": "t_mapping(t_string_memory_ptr,t_string_storage)",
263+
"src": "contracts/StreamRegistry/StreamRegistryV3.sol:38"
264+
},
265+
{
266+
"contract": "StreamRegistryV3",
267+
"label": "ensCache",
268+
"type": "t_contract(ENSCache)13757",
269+
"src": "contracts/StreamRegistry/StreamRegistryV3.sol:39"
270+
},
271+
{
272+
"contract": "StreamRegistryV3",
273+
"label": "streamIdToVersion",
274+
"type": "t_mapping(t_string_memory_ptr,t_uint32)",
275+
"src": "contracts/StreamRegistry/StreamRegistryV3.sol:42"
276+
}
277+
],
278+
"types": {
279+
"t_mapping(t_string_memory_ptr,t_mapping(t_bytes32,t_struct(Permission)10857_storage))": {
280+
"label": "mapping(string => mapping(bytes32 => struct StreamRegistryV3.Permission))"
281+
},
282+
"t_string_storage": {
283+
"label": "string"
284+
},
285+
"t_mapping(t_bytes32,t_struct(Permission)10857_storage)": {
286+
"label": "mapping(bytes32 => struct StreamRegistryV3.Permission)"
287+
},
288+
"t_bytes32": {
289+
"label": "bytes32"
290+
},
291+
"t_struct(Permission)10857_storage": {
292+
"label": "struct StreamRegistryV3.Permission",
293+
"members": [
294+
{
295+
"label": "canEdit",
296+
"type": "t_bool"
297+
},
298+
{
299+
"label": "canDelete",
300+
"type": "t_bool"
301+
},
302+
{
303+
"label": "publishExpiration",
304+
"type": "t_uint256"
305+
},
306+
{
307+
"label": "subscribeExpiration",
308+
"type": "t_uint256"
309+
},
310+
{
311+
"label": "canGrant",
312+
"type": "t_bool"
313+
}
314+
]
315+
},
316+
"t_bool": {
317+
"label": "bool"
318+
},
319+
"t_uint256": {
320+
"label": "uint256"
321+
},
322+
"t_mapping(t_string_memory_ptr,t_string_storage)": {
323+
"label": "mapping(string => string)"
324+
},
325+
"t_contract(ENSCache)13757": {
326+
"label": "contract ENSCache"
327+
},
328+
"t_mapping(t_string_memory_ptr,t_uint32)": {
329+
"label": "mapping(string => uint32)"
330+
},
331+
"t_uint32": {
332+
"label": "uint32"
333+
},
334+
"t_mapping(t_bytes32,t_struct(RoleData)2219_storage)": {
335+
"label": "mapping(bytes32 => struct AccessControlUpgradeable.RoleData)"
336+
},
337+
"t_struct(RoleData)2219_storage": {
338+
"label": "struct AccessControlUpgradeable.RoleData",
339+
"members": [
340+
{
341+
"label": "members",
342+
"type": "t_mapping(t_address,t_bool)"
343+
},
344+
{
345+
"label": "adminRole",
346+
"type": "t_bytes32"
347+
}
348+
]
349+
},
350+
"t_mapping(t_address,t_bool)": {
351+
"label": "mapping(address => bool)"
352+
},
353+
"t_address": {
354+
"label": "address"
355+
},
356+
"t_array(t_uint256)49_storage": {
357+
"label": "uint256[49]"
358+
},
359+
"t_array(t_uint256)50_storage": {
360+
"label": "uint256[50]"
361+
}
362+
}
363+
}
364+
}
365+
}
366+
}

0 commit comments

Comments
 (0)