This documents explains in detail how keeper-contracts should be deployed using zeppelinOS and how the contracts can be upgraded. The latest section describes the test procedure.
The first step to work with zos
is to install dependencies then initialize the project. Then compile contracts and add contracts to the project.
Finally push the contracts into the network and create the upgradable instances. Once the contracts are deployed they can be tested and upgraded.
Also we change the proxy administrator to a MultiSignature wallet to approve upgrades. We are going to use dori in order to perform
any future deployments/upgrades.
Here we provide more details into each step of the initial deploy and the approach of upgradeability and governance.
Before going into more details about the deployment. We should differentiate between different roles in the system which govern the upgradeability in keeper-contracts.
Roles are defined as follows:
deployer: represented as accounts[0]
upgrader: represented as accounts[1]
upgraderWallet: represented as the upgrader from wallets.json
ownerWallet: represented as the owner from wallets.json
-
Deployer: Can be any account. It is used for deploying the initial
proxy contracts
and thelogic contracts
. -
Upgrader: Has to be an
owner
of theupgrader
multi sig wallet. It is used for issuing upgrade requests against the upgrader multi sig wallet. -
UpgraderWallet: One instance of the multi sig wallet, defined as
upgrader
. This wallet will be assigned as zos admin and is required to do upgrades. -
OwnerWallet: One instance of the multi sig wallet, defined as
owner
. This wallet will be assigned as the owner of all the contracts. It can be used to call specific functions in the contracts ie. change the configuration.
zos
does not support migrations, hence all the initial configuration should be performed with a dori.
Contract constructors are ignored so the initial setup of the contract should be made in a initialize
function that will be executed only once after the initial deployment.
Dori checks the contracts.json
in order to detect the current contracts that are going to be deployed:
[
"ConditionStoreManager",
"TemplateStoreManager",
"AgreementStoreManager",
"SignCondition",
"HashLockCondition",
"LockRewardCondition",
"AccessSecretStoreCondition",
"EscrowReward",
"EscrowAccessSecretStoreTemplate",
"OceanToken",
"DIDRegistry"
]
Moreover for each network, dori needs to detect the roles and their addresses from a pre-defined wallets config file.
The following configuration should be an example for wallets-<NETWORK_NAME>.json
:
[
{
"name": "upgrader",
"address": "0x24eb26d4042a2ab576e7e39b87c3f33f276aef92"
},
{
"name": "owner",
"address": "0xd02d68c62401472ce35ba3c7e505deae62db2b8b"
}
]
The following commands clean, install dependencies and compile the contracts:
$ npm run clean #to clean the work dir
$ npm i #install dependencies
$ npm run compile #to compile the contracts
The following steps shows how to perform contracts deployment and upgrade on Nile
and Kovan
networks.
- Copy the wallet file for
nile
cp wallets_nile.json wallets.json
- run
export MNEMONIC=<your nile mnemonic>
. You will find them in the password manager.
- To deploy all contracts run
npm run deploy:nile
- To deploy a single contract you need to specify the contracts to deploy as a parameter to the deploy script: ie.
npm run deploy:nile -- OceanToken Dispenser
will deployOceanToken
andDispenser
.
- To upgrade all contracts run
npm run upgrade:nile
- To upgrade a single contract run
npm run upgrade:nile -- OceanToken
. For upgrading theOceanToken
contract.
- Commit all changes in
artifacts/*.nile.json
- Copy the wallet file for
kovan
>cp wallets_kovan.json wallets.json
- run
export MNEMONIC=<your kovan mnemonic>
. You will find them in the password manager. - run
export INFURA_TOKEN=<your infura token>
. You will get it frominfura
.
- To deploy all the contracts run
npm run deploy:kovan
- To deploy a single contracts you need to specify the contracts to deploy as a parameter to the deploy script: ie.
npm run deploy:kovan -- OceanToken Dispenser
will deployOceanToken
andDispenser
.
- To upgrade all contracts run
npm run upgrade:kovan
- To upgrade a single contract run
npm run upgrade:kovan -- OceanToken
. For upgrading theOceanToken
contract.
- Commit all changes in
artifacts/*.kovan.json
All upgrades of the contracts have to be approved by the upgrader
wallet configured in the wallets.json
file.
- go to https://wallet.gnosis.pm
- Load
upgrader
wallet - Select an Ethereum Account that is an
owner
of the multi sig wallet, but not the one who issued the upgrade request. This can be done in the following ways:- Connect to a local Blockchain node that holds the private key.
- Connect to MetaMask and select the owner account from the multi sig wallet.
- Connect a hardware wallet like ledger or trezor.
- Select the transaction you want to confirm (the upgrade script will tell you which transactions have to be approved in which wallets)
- Click Confirm
To check or document that all transactions have been approved in the multi sig wallet you can run npm run audit:nile
to get a list of all the current transactions and their current status.
Wallet: 0x24EB26D4042a2AB576E7E39b87c3f33f276AeF92
Transaction ID: 64
Destination: 0xfA16d26e9F4fffC6e40963B281a0bB08C31ed40C
Contract: EscrowAccessSecretStoreTemplate
Data is `upgradeTo` call: true
Confirmed from: 0x7A13E1aD23546c9b804aDFd13e9AcB184EfCAF58
Executed: false
- Update the addresses in the
README.md
- run
node ./scripts/contracts/get-addresses.js <network name>
It will output the current proxy addresses in the README
friendly format.
| AccessSecretStoreCondition | v0.9.0 | 0x45DE141F8Efc355F1451a102FB6225F1EDd2921d |
| AgreementStoreManager | v0.9.0 | 0x62f84700b1A0ea6Bfb505aDC3c0286B7944D247C |
| ConditionStoreManager | v0.9.0 | 0x39b0AA775496C5ebf26f3B81C9ed1843f09eE466 |
| DIDRegistry | v0.9.0 | 0x4A0f7F763B1A7937aED21D63b2A78adc89c5Db23 |
| DIDRegistryLibrary | v0.9.0 | 0x3B3504908Db36f5D5f07CD420ee2BBBbDfB674cF |
| Dispenser | v0.9.0 | 0x865396b7ddc58C693db7FCAD1168E3BD95Fe3368 |
....
- Copy this to the
README.md