miden-standards 0.14.6

Standards of the Miden protocol
Documentation
use miden_protocol::Word;
use miden_protocol::account::component::{
    AccountComponentMetadata,
    FeltSchema,
    SchemaType,
    StorageSchema,
    StorageSlotSchema,
};
use miden_protocol::account::{
    AccountComponent,
    AccountType,
    StorageMap,
    StorageMapKey,
    StorageSlot,
    StorageSlotName,
};
use miden_protocol::utils::sync::LazyLock;

use super::MintPolicyAuthority;
use crate::account::components::auth_controlled_library;
use crate::procedure_digest;

// CONSTANTS
// ================================================================================================

procedure_digest!(
    ALLOW_ALL_POLICY_ROOT,
    AuthControlled::NAME,
    AuthControlled::ALLOW_ALL_PROC_NAME,
    auth_controlled_library
);

static ACTIVE_MINT_POLICY_PROC_ROOT_SLOT_NAME: LazyLock<StorageSlotName> = LazyLock::new(|| {
    StorageSlotName::new("miden::standards::mint_policy_manager::active_policy_proc_root")
        .expect("storage slot name should be valid")
});
static ALLOWED_MINT_POLICY_PROC_ROOTS_SLOT_NAME: LazyLock<StorageSlotName> = LazyLock::new(|| {
    StorageSlotName::new("miden::standards::mint_policy_manager::allowed_policy_proc_roots")
        .expect("storage slot name should be valid")
});
/// An [`AccountComponent`] providing configurable mint-policy management for network faucets.
///
/// It reexports policy procedures from `miden::standards::mint_policies` and manager procedures
/// from `miden::standards::mint_policies::policy_manager`:
/// - `allow_all`
/// - `set_mint_policy`
/// - `get_mint_policy`
///
/// ## Storage Layout
///
/// - [`Self::active_policy_proc_root_slot`]: Procedure root of the active mint policy.
/// - [`Self::allowed_policy_proc_roots_slot`]: Set of allowed mint policy procedure roots.
/// - [`Self::policy_authority_slot`]: Policy authority mode
///   ([`MintPolicyAuthority::AuthControlled`] = tx auth, [`MintPolicyAuthority::OwnerControlled`] =
///   external owner).
#[derive(Debug, Clone, Copy)]
pub struct AuthControlled {
    initial_policy_root: Word,
}

/// Initial policy configuration for the [`AuthControlled`] component.
#[derive(Debug, Clone, Copy, Default)]
pub enum AuthControlledInitConfig {
    /// Sets the initial policy to `allow_all`.
    #[default]
    AllowAll,
    /// Sets a custom initial policy root.
    CustomInitialRoot(Word),
}

impl AuthControlled {
    /// The name of the component.
    pub const NAME: &'static str = "miden::standards::components::mint_policies::auth_controlled";

    const ALLOW_ALL_PROC_NAME: &str = "allow_all";

    /// Creates a new [`AuthControlled`] component from the provided configuration.
    pub fn new(policy: AuthControlledInitConfig) -> Self {
        let initial_policy_root = match policy {
            AuthControlledInitConfig::AllowAll => Self::allow_all_policy_root(),
            AuthControlledInitConfig::CustomInitialRoot(root) => root,
        };

        Self { initial_policy_root }
    }

    /// Creates a new [`AuthControlled`] component with `allow_all` policy as
    /// default.
    pub fn allow_all() -> Self {
        Self::new(AuthControlledInitConfig::AllowAll)
    }

    /// Returns the [`StorageSlotName`] where the active mint policy procedure root is stored.
    pub fn active_policy_proc_root_slot() -> &'static StorageSlotName {
        &ACTIVE_MINT_POLICY_PROC_ROOT_SLOT_NAME
    }

    /// Returns the [`StorageSlotName`] where allowed policy roots are stored.
    pub fn allowed_policy_proc_roots_slot() -> &'static StorageSlotName {
        &ALLOWED_MINT_POLICY_PROC_ROOTS_SLOT_NAME
    }

    /// Returns the storage slot schema for the active mint policy root.
    pub fn active_policy_proc_root_slot_schema() -> (StorageSlotName, StorageSlotSchema) {
        (
            Self::active_policy_proc_root_slot().clone(),
            StorageSlotSchema::value(
                "The procedure root of the active mint policy in the mint policy auth controlled component",
                [
                    FeltSchema::felt("proc_root_0"),
                    FeltSchema::felt("proc_root_1"),
                    FeltSchema::felt("proc_root_2"),
                    FeltSchema::felt("proc_root_3"),
                ],
            ),
        )
    }

    /// Returns the storage slot schema for the allowed policy roots map.
    pub fn allowed_policy_proc_roots_slot_schema() -> (StorageSlotName, StorageSlotSchema) {
        (
            Self::allowed_policy_proc_roots_slot().clone(),
            StorageSlotSchema::map(
                "The set of allowed mint policy procedure roots in the mint policy auth controlled component",
                SchemaType::native_word(),
                SchemaType::native_word(),
            ),
        )
    }

    /// Returns the [`StorageSlotName`] containing policy authority mode.
    pub fn policy_authority_slot() -> &'static StorageSlotName {
        MintPolicyAuthority::slot()
    }

    /// Returns the storage slot schema for policy authority mode.
    pub fn policy_authority_slot_schema() -> (StorageSlotName, StorageSlotSchema) {
        (
            Self::policy_authority_slot().clone(),
            StorageSlotSchema::value(
                "Policy authority mode (AuthControlled = tx auth, OwnerControlled = external owner)",
                [
                    FeltSchema::u8("policy_authority"),
                    FeltSchema::new_void(),
                    FeltSchema::new_void(),
                    FeltSchema::new_void(),
                ],
            ),
        )
    }

    /// Returns the default `allow_all` policy root.
    pub fn allow_all_policy_root() -> Word {
        *ALLOW_ALL_POLICY_ROOT
    }

    /// Returns the policy authority used by this component.
    pub fn mint_policy_authority(&self) -> MintPolicyAuthority {
        MintPolicyAuthority::AuthControlled
    }
}

impl Default for AuthControlled {
    fn default() -> Self {
        Self::allow_all()
    }
}

impl From<AuthControlled> for AccountComponent {
    fn from(auth_controlled: AuthControlled) -> Self {
        let active_policy_proc_root_slot = StorageSlot::with_value(
            AuthControlled::active_policy_proc_root_slot().clone(),
            auth_controlled.initial_policy_root,
        );
        let allowed_policy_flag = Word::from([1u32, 0, 0, 0]);
        let allow_all_policy_root = AuthControlled::allow_all_policy_root();

        let mut allowed_policy_entries =
            vec![(StorageMapKey::from_raw(allow_all_policy_root), allowed_policy_flag)];

        if auth_controlled.initial_policy_root != allow_all_policy_root {
            allowed_policy_entries.push((
                StorageMapKey::from_raw(auth_controlled.initial_policy_root),
                allowed_policy_flag,
            ));
        }

        let allowed_policy_proc_roots = StorageMap::with_entries(allowed_policy_entries)
            .expect("allowed mint policy roots should have unique keys");

        let allowed_policy_proc_roots_slot = StorageSlot::with_map(
            AuthControlled::allowed_policy_proc_roots_slot().clone(),
            allowed_policy_proc_roots,
        );
        let policy_authority_slot = StorageSlot::from(auth_controlled.mint_policy_authority());

        let storage_schema = StorageSchema::new(vec![
            AuthControlled::active_policy_proc_root_slot_schema(),
            AuthControlled::allowed_policy_proc_roots_slot_schema(),
            AuthControlled::policy_authority_slot_schema(),
        ])
        .expect("storage schema should be valid");

        let metadata =
            AccountComponentMetadata::new(AuthControlled::NAME, [AccountType::FungibleFaucet])
                .with_description(
                    "Mint policy auth controlled component for network fungible faucets",
                )
                .with_storage_schema(storage_schema);

        AccountComponent::new(
            auth_controlled_library(),
            vec![
                active_policy_proc_root_slot,
                allowed_policy_proc_roots_slot,
                policy_authority_slot,
            ],
            metadata,
        )
        .expect(
            "mint policy auth controlled component should satisfy the requirements of a valid account component",
        )
    }
}