Skip to content

Add app government#90

Draft
crypt0fairy wants to merge 9 commits intomasterfrom
taras/gov
Draft

Add app government#90
crypt0fairy wants to merge 9 commits intomasterfrom
taras/gov

Conversation

@crypt0fairy
Copy link

contract changes Layr-Labs/eigenx-contracts#9

…mmands

- ABI: getAppGoverned→getAppTimelocked, DirectUpgradeNotAllowed→TimelockRequired,
  GovernanceRequired→NotTimelocked
- SDK caller: getAppGoverned→getAppTimelocked, update error messages
- SDK app module: isGoverned→isTimelocked in interface and implementation
- CLI upgrade: block direct upgrade when app is timelocked
- CLI upgrade schedule/execute: new commands for timelocked two-step flow
- CLI ownership transfer: new command, shows timelocked mode note post-transfer
- Docs: add governance-commands.md documenting all new commands and flows
SDK:
- Update AppController ABI from latest contract (adds cancelUpgrade, team role functions, getAppOwner)
- Add cancelAppUpgrade, grantTeamRole, revokeTeamRole, getTeamRoleMembers, getAppOwner to caller.ts
- Add TeamRole enum to SDK
- Add cancelUpgrade, grantTeamRole, revokeTeamRole, getTeamRoleMembers to AppModule interface and implementation
- Export new functions and types from client/index.ts

CLI:
- ecloud compute app upgrade cancel — cancel a pending scheduled upgrade
- ecloud compute team grant <addr> --role=PAUSER|DEVELOPER — grant team role
- ecloud compute team revoke <addr> --role=PAUSER|DEVELOPER — revoke team role
- ecloud compute team list — show ADMIN/PAUSER/DEVELOPER members for an app
…e selection

- CLI now stores multiple identities (EOA, Safe, Timelock) per user in config
- Active identity is tracked per environment
- auth login: shows identity selector; 1 identity auto-prompts, replacing key wipes old identities and re-discovers Timelock for new EOA
- auth new/generate: rewritten with EOA/Safe/Timelock flows; enforces CANONICAL_SALT for deterministic Timelock addresses
- auth whoami: shows all identities with active marker and signing key status
- SDK: add deploySafe, deployTimelock, discoverTimelockForEOA, CANONICAL_SALT
- SDK: add SafeTimelockFactory and TimelockController ABIs
…ore replace

- auth new → Safe: auto-generate signing key if none exists, EOA always pre-filled as owner
- auth new → Timelock: EOA proposer defaults to signing key, Safe prompts for address
- Consistent warning message across all key-replace flows
- Show existing key in pager before warning so user can back it up
- Safe Transaction Service discovery in auth login (find Safes where EOA is owner)
- Remove redundant Safe identity entry when Safe+Timelock deployed together
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant