|
@@ -1,6 +1,6 @@
|
|
|
diff -ruN access/AccessControl.sol access/AccessControl.sol
|
|
|
---- access/AccessControl.sol 2022-03-02 09:14:55.000000000 -0800
|
|
|
-+++ access/AccessControl.sol 2022-04-08 17:31:22.000000000 -0700
|
|
|
+--- access/AccessControl.sol 2022-05-06 13:44:28.000000000 -0700
|
|
|
++++ access/AccessControl.sol 2022-05-09 09:49:26.000000000 -0700
|
|
|
@@ -93,7 +93,7 @@
|
|
|
*
|
|
|
* _Available since v4.6._
|
|
@@ -10,9 +10,21 @@ diff -ruN access/AccessControl.sol access/AccessControl.sol
|
|
|
_checkRole(role, _msgSender());
|
|
|
}
|
|
|
|
|
|
+diff -ruN governance/Governor.sol governance/Governor.sol
|
|
|
+--- governance/Governor.sol 2022-05-09 09:11:10.000000000 -0700
|
|
|
++++ governance/Governor.sol 2022-05-09 09:49:26.000000000 -0700
|
|
|
+@@ -42,7 +42,7 @@
|
|
|
+
|
|
|
+ string private _name;
|
|
|
+
|
|
|
+- mapping(uint256 => ProposalCore) private _proposals;
|
|
|
++ mapping(uint256 => ProposalCore) internal _proposals;
|
|
|
+
|
|
|
+ // This queue keeps track of the governor operating on itself. Calls to functions protected by the
|
|
|
+ // {onlyGovernance} modifier needs to be whitelisted in this queue. Whitelisting is set in {_beforeExecute},
|
|
|
diff -ruN governance/TimelockController.sol governance/TimelockController.sol
|
|
|
---- governance/TimelockController.sol 2022-03-02 09:14:55.000000000 -0800
|
|
|
-+++ governance/TimelockController.sol 2022-04-08 17:31:22.000000000 -0700
|
|
|
+--- governance/TimelockController.sol 2022-05-06 13:44:28.000000000 -0700
|
|
|
++++ governance/TimelockController.sol 2022-05-09 09:49:26.000000000 -0700
|
|
|
@@ -24,10 +24,10 @@
|
|
|
bytes32 public constant TIMELOCK_ADMIN_ROLE = keccak256("TIMELOCK_ADMIN_ROLE");
|
|
|
bytes32 public constant PROPOSER_ROLE = keccak256("PROPOSER_ROLE");
|
|
@@ -32,9 +44,23 @@ diff -ruN governance/TimelockController.sol governance/TimelockController.sol
|
|
|
}
|
|
|
-}
|
|
|
+}
|
|
|
+diff -ruN governance/extensions/GovernorPreventLateQuorum.sol governance/extensions/GovernorPreventLateQuorum.sol
|
|
|
+--- governance/extensions/GovernorPreventLateQuorum.sol 2022-05-09 09:11:01.000000000 -0700
|
|
|
++++ governance/extensions/GovernorPreventLateQuorum.sol 2022-05-09 09:49:26.000000000 -0700
|
|
|
+@@ -21,8 +21,8 @@
|
|
|
+ using SafeCast for uint256;
|
|
|
+ using Timers for Timers.BlockNumber;
|
|
|
+
|
|
|
+- uint64 private _voteExtension;
|
|
|
+- mapping(uint256 => Timers.BlockNumber) private _extendedDeadlines;
|
|
|
++ uint64 internal _voteExtension;
|
|
|
++ mapping(uint256 => Timers.BlockNumber) internal _extendedDeadlines;
|
|
|
+
|
|
|
+ /// @dev Emitted when a proposal deadline is pushed back due to reaching quorum late in its voting period.
|
|
|
+ event ProposalExtended(uint256 indexed proposalId, uint64 extendedDeadline);
|
|
|
diff -ruN governance/utils/Votes.sol governance/utils/Votes.sol
|
|
|
---- governance/utils/Votes.sol 2022-03-02 09:14:55.000000000 -0800
|
|
|
-+++ governance/utils/Votes.sol 2022-04-08 17:44:19.000000000 -0700
|
|
|
+--- governance/utils/Votes.sol 2022-05-06 13:44:28.000000000 -0700
|
|
|
++++ governance/utils/Votes.sol 2022-05-09 09:49:26.000000000 -0700
|
|
|
@@ -35,7 +35,25 @@
|
|
|
bytes32 private constant _DELEGATION_TYPEHASH =
|
|
|
keccak256("Delegation(address delegatee,uint256 nonce,uint256 expiry)");
|
|
@@ -108,8 +134,8 @@ diff -ruN governance/utils/Votes.sol governance/utils/Votes.sol
|
|
|
+ function _getVotingUnits(address) public virtual returns (uint256); // HARNESS: internal -> public
|
|
|
}
|
|
|
diff -ruN token/ERC1155/ERC1155.sol token/ERC1155/ERC1155.sol
|
|
|
---- token/ERC1155/ERC1155.sol 2022-03-02 09:14:55.000000000 -0800
|
|
|
-+++ token/ERC1155/ERC1155.sol 2022-04-08 17:31:22.000000000 -0700
|
|
|
+--- token/ERC1155/ERC1155.sol 2022-05-06 13:44:28.000000000 -0700
|
|
|
++++ token/ERC1155/ERC1155.sol 2022-05-09 09:49:26.000000000 -0700
|
|
|
@@ -268,7 +268,7 @@
|
|
|
uint256 id,
|
|
|
uint256 amount,
|
|
@@ -165,8 +191,8 @@ diff -ruN token/ERC1155/ERC1155.sol token/ERC1155/ERC1155.sol
|
|
|
try IERC1155Receiver(to).onERC1155BatchReceived(operator, from, ids, amounts, data) returns (
|
|
|
bytes4 response
|
|
|
diff -ruN token/ERC20/ERC20.sol token/ERC20/ERC20.sol
|
|
|
---- token/ERC20/ERC20.sol 2022-03-02 09:14:55.000000000 -0800
|
|
|
-+++ token/ERC20/ERC20.sol 2022-04-08 17:31:22.000000000 -0700
|
|
|
+--- token/ERC20/ERC20.sol 2022-05-06 13:44:28.000000000 -0700
|
|
|
++++ token/ERC20/ERC20.sol 2022-05-09 09:49:26.000000000 -0700
|
|
|
@@ -277,7 +277,7 @@
|
|
|
* - `account` cannot be the zero address.
|
|
|
* - `account` must have at least `amount` tokens.
|
|
@@ -186,8 +212,8 @@ diff -ruN token/ERC20/ERC20.sol token/ERC20/ERC20.sol
|
|
|
|
|
|
/**
|
|
|
diff -ruN token/ERC20/extensions/ERC20FlashMint.sol token/ERC20/extensions/ERC20FlashMint.sol
|
|
|
---- token/ERC20/extensions/ERC20FlashMint.sol 2022-03-02 09:14:55.000000000 -0800
|
|
|
-+++ token/ERC20/extensions/ERC20FlashMint.sol 2022-04-08 17:31:22.000000000 -0700
|
|
|
+--- token/ERC20/extensions/ERC20FlashMint.sol 2022-05-06 13:44:28.000000000 -0700
|
|
|
++++ token/ERC20/extensions/ERC20FlashMint.sol 2022-05-09 09:49:26.000000000 -0700
|
|
|
@@ -40,9 +40,11 @@
|
|
|
require(token == address(this), "ERC20FlashMint: wrong token");
|
|
|
// silence warning about unused variable without the addition of bytecode.
|
|
@@ -202,8 +228,8 @@ diff -ruN token/ERC20/extensions/ERC20FlashMint.sol token/ERC20/extensions/ERC20
|
|
|
* @dev Performs a flash loan. New tokens are minted and sent to the
|
|
|
* `receiver`, who is required to implement the {IERC3156FlashBorrower}
|
|
|
diff -ruN token/ERC20/extensions/ERC20Votes.sol token/ERC20/extensions/ERC20Votes.sol
|
|
|
---- token/ERC20/extensions/ERC20Votes.sol 2022-03-02 09:14:55.000000000 -0800
|
|
|
-+++ token/ERC20/extensions/ERC20Votes.sol 2022-04-08 17:31:22.000000000 -0700
|
|
|
+--- token/ERC20/extensions/ERC20Votes.sol 2022-05-06 13:43:21.000000000 -0700
|
|
|
++++ token/ERC20/extensions/ERC20Votes.sol 2022-05-09 09:49:26.000000000 -0700
|
|
|
@@ -33,8 +33,8 @@
|
|
|
bytes32 private constant _DELEGATION_TYPEHASH =
|
|
|
keccak256("Delegation(address delegatee,uint256 nonce,uint256 expiry)");
|
|
@@ -335,8 +361,8 @@ diff -ruN token/ERC20/extensions/ERC20Votes.sol token/ERC20/extensions/ERC20Vote
|
|
|
return a + b;
|
|
|
}
|
|
|
diff -ruN token/ERC20/extensions/ERC20Wrapper.sol token/ERC20/extensions/ERC20Wrapper.sol
|
|
|
---- token/ERC20/extensions/ERC20Wrapper.sol 2022-03-02 09:14:55.000000000 -0800
|
|
|
-+++ token/ERC20/extensions/ERC20Wrapper.sol 2022-04-08 17:31:22.000000000 -0700
|
|
|
+--- token/ERC20/extensions/ERC20Wrapper.sol 2022-05-06 13:44:28.000000000 -0700
|
|
|
++++ token/ERC20/extensions/ERC20Wrapper.sol 2022-05-09 09:49:26.000000000 -0700
|
|
|
@@ -44,7 +44,7 @@
|
|
|
* @dev Mint wrapped token to cover any underlyingTokens that would have been transferred by mistake. Internal
|
|
|
* function that can be exposed with access control if desired.
|
|
@@ -347,8 +373,8 @@ diff -ruN token/ERC20/extensions/ERC20Wrapper.sol token/ERC20/extensions/ERC20Wr
|
|
|
_mint(account, value);
|
|
|
return value;
|
|
|
diff -ruN token/ERC721/extensions/draft-ERC721Votes.sol token/ERC721/extensions/draft-ERC721Votes.sol
|
|
|
---- token/ERC721/extensions/draft-ERC721Votes.sol 2022-03-02 09:14:55.000000000 -0800
|
|
|
-+++ token/ERC721/extensions/draft-ERC721Votes.sol 2022-04-08 17:31:22.000000000 -0700
|
|
|
+--- token/ERC721/extensions/draft-ERC721Votes.sol 2022-05-06 13:44:28.000000000 -0700
|
|
|
++++ token/ERC721/extensions/draft-ERC721Votes.sol 2022-05-09 09:49:26.000000000 -0700
|
|
|
@@ -34,7 +34,7 @@
|
|
|
/**
|
|
|
* @dev Returns the balance of `account`.
|