-
Notifications
You must be signed in to change notification settings - Fork 1
/
RuleWhitelistWrapper.sol
112 lines (105 loc) · 3.39 KB
/
RuleWhitelistWrapper.sol
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
// SPDX-License-Identifier: MPL-2.0
pragma solidity ^0.8.20;
import "OZ/access/AccessControl.sol";
import "../../modules/RuleEngineValidationCommon.sol";
import "../../modules/MetaTxModuleStandalone.sol";
import "./abstract/RuleAddressList/RuleAddressList.sol";
import "./abstract/RuleWhitelistCommon.sol";
/**
* @title Wrapper to call several different whitelist rules
*/
contract RuleWhitelistWrapper is
RuleEngineValidationCommon,
MetaTxModuleStandalone,
RuleWhitelistCommon
{
/**
* @param admin Address of the contract (Access Control)
* @param forwarderIrrevocable Address of the forwarder, required for the gasless support
*/
constructor(
address admin,
address forwarderIrrevocable
) MetaTxModuleStandalone(forwarderIrrevocable) {
if (admin == address(0)) {
revert RuleEngine_AdminWithAddressZeroNotAllowed();
}
_grantRole(DEFAULT_ADMIN_ROLE, admin);
_grantRole(RULE_ENGINE_OPERATOR_ROLE, admin);
}
/**
* @notice Go through all the whitelist rules to know if a restriction exists on the transfer
* @param _from the origin address
* @param _to the destination address
* @return The restricion code or REJECTED_CODE_BASE.TRANSFER_OK
**/
function detectTransferRestriction(
address _from,
address _to,
uint256 /*_amount*/
) public view override returns (uint8) {
address[] memory targetAddress = new address[](2);
bool[] memory isListed = new bool[](2);
bool[] memory result = new bool[](2);
targetAddress[0] = _from;
targetAddress[1] = _to;
uint256 rulesLength = _rulesValidation.length;
// For each whitelist rule, we ask if from or to are in the whitelist
for (uint256 i = 0; i < rulesLength; ++i) {
// External call
isListed = RuleAddressList(_rulesValidation[i])
.addressIsListedBatch(targetAddress);
if (isListed[0] && !result[0]) {
// Update if from is in the list
result[0] = true;
}
if (isListed[1] && !result[1]) {
// Update if to is in the list
result[1] = true;
}
if (result[0] && result[1]) {
break;
}
}
if (!result[0]) {
return CODE_ADDRESS_FROM_NOT_WHITELISTED;
} else if (!result[1]) {
return CODE_ADDRESS_TO_NOT_WHITELISTED;
} else {
return uint8(REJECTED_CODE_BASE.TRANSFER_OK);
}
}
/**
* @dev This surcharge is not necessary if you do not use the MetaTxModule
*/
function _msgSender()
internal
view
override(ERC2771Context, Context)
returns (address sender)
{
return ERC2771Context._msgSender();
}
/**
* @dev This surcharge is not necessary if you do not use the MetaTxModule
*/
function _msgData()
internal
view
override(ERC2771Context, Context)
returns (bytes calldata)
{
return ERC2771Context._msgData();
}
/**
* @dev This surcharge is not necessary if you do not use the MetaTxModule
*/
function _contextSuffixLength()
internal
view
override(ERC2771Context, Context)
returns (uint256)
{
return ERC2771Context._contextSuffixLength();
}
}