Skip to content

Conversation

@LucasCambon
Copy link
Contributor

  • Upgrade Solidity version to 0.8.30
  • Upgrade EVM version to praga (same as OZ)
  • Upgrade @ensuro/utils to latest
  • Upgrade @ensuro/swaplibrary to latest
  • Upgrade OZ to 5.5 & remove dead code contracts
  • Move strategies to contracts/strategies
  • Upgrade to Hardhat 3

Copy link
Contributor

@gnarvaja gnarvaja left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Revisé algunas cosas, después sigo con el resto.

string memory name_,
string memory symbol_,
address admin_,
address,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cambialo para que ya no reciba este parámetro. Sería simplemente cambiar los tests, este contrato no se usa más que en este repo.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Entiendo que ahora este contrato queda sin ningún permiso, todos los métodos abiertos. Tiene sentido para un contrato que se usa para tests.

dependencyCompiler: {
paths: [
"@ensuro/utils/contracts/TestCurrency.sol",
"@ensuro/utils/contracts/TestCurrencyAC.sol",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Creo que sería mejor usar el TestCurrency a secas, sin access control. No me parece que necesitemos para los tests que tenga access control y los hace más complicados.

Lo mismo en el repo de CashFlowLender.

},
});
const strategy = await CompoundV3InvestStrategy.deploy(ADDRESSES.cUSDCv3, ADDRESSES.REWARDS);
const MultiStrategyERC4626 = await ethers.getContractFactory("MultiStrategyERC4626");
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Esta variante, en lugar de borrarla, habría que hacer que sea usando el AccessManagedMSV. Salvo que eso ya esté probado más abajo en otra variante.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ah, esta creo que ya está cubierta en CompoundV3Strategy+AccessManaged

name: "AAVEV3Strategy",
cToken: ADDRESSES.aUSDCv3,
supplyToken: ADDRESSES.USDC,
fixture: async () => {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Esta variante, en lugar de borrarla, habría que hacer que sea usando el AccessManagedMSV. Salvo que eso ya esté probado más abajo en otra variante.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Esta me parece que no. Habría que hacer una AAVEV3Strategy+AccessManaged

const specificRole = await vault.getForwardToStrategyRole(0, operation);
await grantRole(hre, vault.connect(admin), specificRole, user);
},
},
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Idem, no borrar las variantes (ni los tests que testean cosas específicas de estas), adaptarlas para que trabajen con AccessManagedMSV.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants