-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[VEN-3018]: configure RiskStewardReceiver and MarketCapsRiskSteward #463
base: main
Are you sure you want to change the base?
Conversation
df3efce
to
a3ed6e9
Compare
a3ed6e9
to
9cfc49c
Compare
5fcb751
to
9f693c5
Compare
vips/vip-xxx/bsctestnet.ts
Outdated
...IL_COMPTROLLERS.map((comptroller) => ({ | ||
target: ACM, | ||
signature: "giveCallPermission(address,string,address)", | ||
params: [comptroller, "setMarketSupplyCaps(address[],uint256[])", MARKET_CAPS_RISK_STEWARD], | ||
})), | ||
...IL_COMPTROLLERS.map((comptroller) => ({ | ||
target: ACM, | ||
signature: "giveCallPermission(address,string,address)", | ||
params: [comptroller, "setMarketBorrowCaps(address[],uint256[])", MARKET_CAPS_RISK_STEWARD], | ||
})), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it would make sense to use the wildcard 0x0 in this case, allowing the risk steward contracts to invoke the mentioned functions on any contract. This way, we won't have to update the permissions if a new pool is added in the future
vips/vip-xxx/bsctestnet.ts
Outdated
export const LIQUID_STAKING_ETH_COMPTROLLER = "0xC7859B809Ed5A2e98659ab5427D5B69e706aE26b"; | ||
export const MEME_COMPTROLLER = "0x92e8E3C202093A495e98C10f9fcaa5Abe288F74A"; | ||
export const ACM = "0x45f8a08F534f34A97187626E05d4b6648Eeaa9AA"; | ||
export const RISK_STEWARD_RECEIVER = "0x34e4505f92C8499B07eeb7Aa72404A490D152Ab3"; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't see this contract deployed at VenusProtocol/governance-contracts#115
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I haven't pushed the deployments. (Updated and pushing)
vips/vip-xxx/bsctestnet.ts
Outdated
{ | ||
target: ACM, | ||
signature: "giveCallPermission(address,string,address)", | ||
params: [RISK_STEWARD_RECEIVER, "setRiskParameterConfig(string,address,uint256)", NORMAL_TIMELOCK], | ||
}, | ||
{ | ||
target: ACM, | ||
signature: "giveCallPermission(address,string,address)", | ||
params: [RISK_STEWARD_RECEIVER, "toggleConfigActive(string)", NORMAL_TIMELOCK], | ||
}, | ||
{ | ||
target: ACM, | ||
signature: "giveCallPermission(address,string,address)", | ||
params: [RISK_STEWARD_RECEIVER, "pause()", NORMAL_TIMELOCK], | ||
}, | ||
{ | ||
target: ACM, | ||
signature: "giveCallPermission(address,string,address)", | ||
params: [RISK_STEWARD_RECEIVER, "unpause()", NORMAL_TIMELOCK], | ||
}, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think Fast-track and Critical timelocks should also be authorized to call these functions
{ | ||
target: ACM, | ||
signature: "giveCallPermission(address,string,address)", | ||
params: [MARKET_CAPS_RISK_STEWARD, "setMaxIncreaseBps(uint256)", NORMAL_TIMELOCK], | ||
}, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would also authorize Fast-track and Critical timelocks
…e for calling IL pools
a4b87c8
to
9c63bb2
Compare
9c63bb2
to
55928da
Compare
Description
Resolves VEN