Skip to content

Commit 0e32474

Browse files
authored
Merge branch 'master' into erc721-tests
2 parents fc4acd0 + 7ae222b commit 0e32474

23 files changed

Lines changed: 53 additions & 61 deletions

File tree

.github/actions/gas-compare/action.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,8 @@ runs:
4444
shell: bash
4545
- name: Save report
4646
if: github.event_name != 'pull_request'
47-
uses: actions/upload-artifact@v3
47+
uses: actions/upload-artifact@v4
4848
with:
4949
name: gasreport
50+
overwrite: true
5051
path: ${{ inputs.out_report }}

.github/actions/storage-layout/action.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,8 @@ runs:
5050
shell: bash
5151
- name: Save artifacts
5252
if: github.event_name != 'pull_request'
53-
uses: actions/upload-artifact@v3
53+
uses: actions/upload-artifact@v4
5454
with:
5555
name: layout
56+
overwrite: true
5657
path: ${{ inputs.out_layout }}

.gitignore

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,7 @@ npm-debug.log
3737

3838
# docs artifacts
3939
docs/modules/api
40+
build/site
4041

4142
# only used to package @openzeppelin/contracts
4243
contracts/build/

contracts/governance/Governor.sol

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -455,7 +455,7 @@ abstract contract Governor is Context, ERC165, EIP712, Nonces, IGovernor, IERC72
455455
* performed (for example adding a vault/timelock).
456456
*
457457
* NOTE: Calling this function directly will NOT check the current state of the proposal, set the executed flag to
458-
* true or emit the `ProposalExecuted` event. Executing a proposal should be done using {execute} or {_execute}.
458+
* true or emit the `ProposalExecuted` event. Executing a proposal should be done using {execute}.
459459
*/
460460
function _executeOperations(
461461
uint256 /* proposalId */,

contracts/governance/README.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ NOTE: Functions of the `Governor` contract do not include access control. If you
6868

6969
{{GovernorCountingFractional}}
7070

71-
{{GovernorCountingOverride}}
71+
{{GovernorCountingOverridable}}
7272

7373
{{GovernorVotes}}
7474

@@ -103,7 +103,7 @@ In a governance system, the {TimelockController} contract is in charge of introd
103103
[[timelock-terminology]]
104104
==== Terminology
105105

106-
* *Operation:* A transaction (or a set of transactions) that is the subject of the timelock. It has to be scheduled by a proposer and executed by an executor. The timelock enforces a minimum delay between the proposition and the execution (see xref:access-control.adoc#operation_lifecycle[operation lifecycle]). If the operation contains multiple transactions (batch mode), they are executed atomically. Operations are identified by the hash of their content.
106+
* *Operation:* A transaction (or a set of transactions) that is the subject of the timelock. It has to be scheduled by a proposer and executed by an executor. The timelock enforces a minimum delay between the proposition and the execution. If the operation contains multiple transactions (batch mode), they are executed atomically. Operations are identified by the hash of their content.
107107
* *Operation status:*
108108
** *Unset:* An operation that is not part of the timelock mechanism.
109109
** *Waiting:* An operation that has been scheduled, before the timer expires.

contracts/governance/extensions/GovernorStorage.sol

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ abstract contract GovernorStorage is Governor {
5050
}
5151

5252
/**
53-
* @dev Version of {IGovernorTimelock-queue} with only `proposalId` as an argument.
53+
* @dev Version of {IGovernor-queue} with only `proposalId` as an argument.
5454
*/
5555
function queue(uint256 proposalId) public virtual {
5656
// here, using storage is more efficient than memory

contracts/governance/extensions/GovernorTimelockAccess.sol

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -277,7 +277,7 @@ abstract contract GovernorTimelockAccess is Governor {
277277
}
278278

279279
/**
280-
* @dev See {IGovernor-_cancel}
280+
* @dev See {Governor-_cancel}
281281
*/
282282
function _cancel(
283283
address[] memory targets,

contracts/proxy/utils/UUPSUpgradeable.sol

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,6 @@ abstract contract UUPSUpgradeable is IERC1822Proxiable {
9191
/**
9292
* @dev Reverts if the execution is not performed via delegatecall or the execution
9393
* context is not of a proxy with an ERC-1967 compliant implementation pointing to self.
94-
* See {_onlyProxy}.
9594
*/
9695
function _checkProxy() internal view virtual {
9796
if (

contracts/token/ERC1155/IERC1155.sol

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ interface IERC1155 is IERC165 {
8181
* @dev Transfers a `value` amount of tokens of type `id` from `from` to `to`.
8282
*
8383
* WARNING: This function can potentially allow a reentrancy attack when transferring tokens
84-
* to an untrusted contract, when invoking {onERC1155Received} on the receiver.
84+
* to an untrusted contract, when invoking {IERC1155Receiver-onERC1155Received} on the receiver.
8585
* Ensure to follow the checks-effects-interactions pattern and consider employing
8686
* reentrancy guards when interacting with untrusted contracts.
8787
*
@@ -101,7 +101,7 @@ interface IERC1155 is IERC165 {
101101
* @dev xref:ROOT:erc1155.adoc#batch-operations[Batched] version of {safeTransferFrom}.
102102
*
103103
* WARNING: This function can potentially allow a reentrancy attack when transferring tokens
104-
* to an untrusted contract, when invoking {onERC1155BatchReceived} on the receiver.
104+
* to an untrusted contract, when invoking {IERC1155Receiver-onERC1155BatchReceived} on the receiver.
105105
* Ensure to follow the checks-effects-interactions pattern and consider employing
106106
* reentrancy guards when interacting with untrusted contracts.
107107
*

contracts/token/ERC1155/utils/ERC1155Utils.sol

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ import {IERC1155Errors} from "../../../interfaces/draft-IERC6093.sol";
1515
*/
1616
library ERC1155Utils {
1717
/**
18-
* @dev Performs an acceptance check for the provided `operator` by calling {IERC1155-onERC1155Received}
18+
* @dev Performs an acceptance check for the provided `operator` by calling {IERC1155Receiver-onERC1155Received}
1919
* on the `to` address. The `operator` is generally the address that initiated the token transfer (i.e. `msg.sender`).
2020
*
2121
* The acceptance call is not executed and treated as a no-op if the target address doesn't contain code (i.e. an EOA).
@@ -50,7 +50,7 @@ library ERC1155Utils {
5050
}
5151

5252
/**
53-
* @dev Performs a batch acceptance check for the provided `operator` by calling {IERC1155-onERC1155BatchReceived}
53+
* @dev Performs a batch acceptance check for the provided `operator` by calling {IERC1155Receiver-onERC1155BatchReceived}
5454
* on the `to` address. The `operator` is generally the address that initiated the token transfer (i.e. `msg.sender`).
5555
*
5656
* The acceptance call is not executed and treated as a no-op if the target address doesn't contain code (i.e. an EOA).

0 commit comments

Comments
 (0)