Commit e0683346 by Francisco Giordano

Transpile 6c3a4cde

parent 08721ef5
...@@ -18,6 +18,10 @@ ...@@ -18,6 +18,10 @@
# Changelog # Changelog
## 3.4.2-solc-0.7 (2021-08-26)
* `TimelockController`: Add additional isOperationReady check.
## 3.4.1-solc-0.7 (2021-03-03) ## 3.4.1-solc-0.7 (2021-03-03)
* `ERC721`: made `_approve` an internal function (was private). * `ERC721`: made `_approve` an internal function (was private).
......
...@@ -234,7 +234,7 @@ contract TimelockControllerUpgradeable is Initializable, AccessControlUpgradeabl ...@@ -234,7 +234,7 @@ contract TimelockControllerUpgradeable is Initializable, AccessControlUpgradeabl
*/ */
function execute(address target, uint256 value, bytes calldata data, bytes32 predecessor, bytes32 salt) public payable virtual onlyRole(EXECUTOR_ROLE) { function execute(address target, uint256 value, bytes calldata data, bytes32 predecessor, bytes32 salt) public payable virtual onlyRole(EXECUTOR_ROLE) {
bytes32 id = hashOperation(target, value, data, predecessor, salt); bytes32 id = hashOperation(target, value, data, predecessor, salt);
_beforeCall(predecessor); _beforeCall(id, predecessor);
_call(id, 0, target, value, data); _call(id, 0, target, value, data);
_afterCall(id); _afterCall(id);
} }
...@@ -253,7 +253,7 @@ contract TimelockControllerUpgradeable is Initializable, AccessControlUpgradeabl ...@@ -253,7 +253,7 @@ contract TimelockControllerUpgradeable is Initializable, AccessControlUpgradeabl
require(targets.length == datas.length, "TimelockController: length mismatch"); require(targets.length == datas.length, "TimelockController: length mismatch");
bytes32 id = hashOperationBatch(targets, values, datas, predecessor, salt); bytes32 id = hashOperationBatch(targets, values, datas, predecessor, salt);
_beforeCall(predecessor); _beforeCall(id, predecessor);
for (uint256 i = 0; i < targets.length; ++i) { for (uint256 i = 0; i < targets.length; ++i) {
_call(id, i, targets[i], values[i], datas[i]); _call(id, i, targets[i], values[i], datas[i]);
} }
...@@ -263,7 +263,8 @@ contract TimelockControllerUpgradeable is Initializable, AccessControlUpgradeabl ...@@ -263,7 +263,8 @@ contract TimelockControllerUpgradeable is Initializable, AccessControlUpgradeabl
/** /**
* @dev Checks before execution of an operation's calls. * @dev Checks before execution of an operation's calls.
*/ */
function _beforeCall(bytes32 predecessor) private view { function _beforeCall(bytes32 id, bytes32 predecessor) private view {
require(isOperationReady(id), "TimelockController: operation is not ready");
require(predecessor == bytes32(0) || isOperationDone(predecessor), "TimelockController: missing dependency"); require(predecessor == bytes32(0) || isOperationDone(predecessor), "TimelockController: missing dependency");
} }
......
{ {
"name": "@openzeppelin/contracts-upgradeable", "name": "@openzeppelin/contracts-upgradeable",
"description": "Secure Smart Contract library for Solidity", "description": "Secure Smart Contract library for Solidity",
"version": "3.4.1-solc-0.7-2", "version": "3.4.2-solc-0.7",
"files": [ "files": [
"**/*.sol", "**/*.sol",
"/build/contracts/*.json", "/build/contracts/*.json",
......
{ {
"name": "openzeppelin-solidity", "name": "openzeppelin-solidity",
"version": "3.4.1-solc-0.7-2", "version": "3.4.2-solc-0.7",
"lockfileVersion": 1, "lockfileVersion": 1,
"requires": true, "requires": true,
"dependencies": { "dependencies": {
......
...@@ -2,7 +2,7 @@ ...@@ -2,7 +2,7 @@
"private": true, "private": true,
"name": "openzeppelin-solidity", "name": "openzeppelin-solidity",
"description": "Secure Smart Contract library for Solidity", "description": "Secure Smart Contract library for Solidity",
"version": "3.4.1-solc-0.7-2", "version": "3.4.2-solc-0.7",
"files": [ "files": [
"/contracts/**/*.sol", "/contracts/**/*.sol",
"/build/contracts/*.json", "/build/contracts/*.json",
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment