1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
/*
 * Copyright 2020 Nuclei Studio OÜ
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

//! This pallet handles compatibility between the "legacy" substrate ACL system
//! which distinguishes between account origins and a root origin. It lets users
//! with a `Root` role trigger calls dispatched with the substrate root origin,
//! typically this gives the possibility to trigger upgrade to the chains and
//! interact with modules that do not support our bylaws system.

#![cfg_attr(not(feature = "std"), no_std)]

#[cfg(test)]
mod tests;

pub use pallet::*;

#[frame_support::pallet]
pub mod pallet {
    use frame_support::{
        dispatch::{DispatchResult, DispatchResultWithPostInfo},
        pallet_prelude::*,
        traits::UnfilteredDispatchable,
        weights::GetDispatchInfo,
        Parameter,
    };
    use frame_system::pallet_prelude::*;
    use governance_os_pallet_bylaws::RoleBuilder;
    use governance_os_support::traits::RoleManager;
    use sp_runtime::traits::StaticLookup;
    use sp_std::boxed::Box;

    #[pallet::config]
    pub trait Config: frame_system::Config {
        /// Because this pallet emits events, it depends on the runtime's definition of an event.
        type Event: From<Event<Self>> + IsType<<Self as frame_system::Config>::Event>;

        /// A sudo-able call.
        type Call: Parameter + UnfilteredDispatchable<Origin = Self::Origin> + GetDispatchInfo;

        /// The role builder used by the `bylaws` pallet
        type RoleBuilder: RoleBuilder<Role = <RoleManagerOf<Self> as RoleManager>::Role>;

        /// Pallet used to manage and check for roles.
        type RoleManager: RoleManager<AccountId = Self::AccountId>;
    }

    pub type RoleBuilderOf<T> = <T as Config>::RoleBuilder;
    pub type RoleManagerOf<T> = <T as Config>::RoleManager;

    #[pallet::event]
    #[pallet::generate_deposit(pub(super) fn deposit_event)]
    pub enum Event<T: Config> {
        /// A sudo just took place. \[result\]
        CompatSudid(DispatchResult),
        /// A root user just performed a call as someone else. \[result\]
        CompatDidAs(DispatchResult),
    }

    #[pallet::pallet]
    pub struct Pallet<T>(PhantomData<T>);

    #[pallet::hooks]
    impl<T: Config> Hooks<BlockNumberFor<T>> for Pallet<T> {}

    #[pallet::call]
    impl<T: Config> Pallet<T> {
        /// Dispatches the given call with a `Root` origin.
        #[pallet::weight({
            let dispatch_info = call.get_dispatch_info();
            (dispatch_info.weight.saturating_add(10_000), dispatch_info.class)
        })]
        pub(crate) fn sudo(
            origin: OriginFor<T>,
            call: Box<<T as Config>::Call>,
        ) -> DispatchResultWithPostInfo {
            RoleManagerOf::<T>::ensure_has_role(origin, RoleBuilderOf::<T>::root())?;

            let res = call.dispatch_bypass_filter(frame_system::RawOrigin::Root.into());
            Self::deposit_event(Event::CompatSudid(res.map(|_| ()).map_err(|e| e.error)));

            // Caller won't pay a fee.
            Ok(Pays::No.into())
        }

        /// A variant of the `sudo` dispatchable that will let caller specify its weight. This could be
        /// useful when trying to push a runtime upgrade but should be used with parcimony.
        #[pallet::weight({(*_weight, call.get_dispatch_info().class)})]
        pub(crate) fn sudo_custom_weight(
            origin: OriginFor<T>,
            call: Box<<T as Config>::Call>,
            _weight: Weight,
        ) -> DispatchResultWithPostInfo {
            // Just proxy back to the `sudo` call
            Self::sudo(origin, call)
        }

        // Dispatches the call with the origin set to `who`.
        #[pallet::weight({
            let dispatch_info = call.get_dispatch_info();
            (
                dispatch_info.weight
                    .saturating_add(10_000)
                    // AccountData for inner call origin accountdata.
                    .saturating_add(T::DbWeight::get().reads_writes(1, 1))
                    // Two read performed by ensure_has_role
                    .saturating_add(T::DbWeight::get().reads(2)),
                dispatch_info.class
            )
        })]
        pub(crate) fn doas(
            origin: OriginFor<T>,
            who: <T::Lookup as StaticLookup>::Source,
            call: Box<<T as Config>::Call>,
        ) -> DispatchResultWithPostInfo {
            RoleManagerOf::<T>::ensure_has_role(origin, RoleBuilderOf::<T>::root())?;

            let who = T::Lookup::lookup(who)?;

            let res = call.dispatch_bypass_filter(frame_system::RawOrigin::Signed(who).into());
            Self::deposit_event(Event::CompatDidAs(res.map(|_| ()).map_err(|e| e.error)));

            // Sudo user does not pay a fee.
            Ok(Pays::No.into())
        }
    }
}