diff --git a/nibiru b/nibiru index 82affcbb..04ba8366 160000 --- a/nibiru +++ b/nibiru @@ -1 +1 @@ -Subproject commit 82affcbbce49314bb80e7af571d5c9bc1f359d40 +Subproject commit 04ba83662994c9e9f3e057278f0afeb8a7f2194e diff --git a/src/protojs/eth/evm/module/module.ts b/src/protojs/eth/evm/module/module.ts new file mode 100644 index 00000000..6e13be70 --- /dev/null +++ b/src/protojs/eth/evm/module/module.ts @@ -0,0 +1,172 @@ +/* eslint-disable */ +import Long from "long"; +import _m0 from "protobufjs/minimal"; + +/** Module is the config object for the devgas module. */ +export interface Module { + /** authority defines the custom module authority. If not set, defaults to the governance module. */ + authority: string; +} + +/** ModuleAccountPermission represents permissions for a module account. */ +export interface ModuleAccountPermission { + /** account is the name of the module. */ + account: string; + /** + * permissions are the permissions this module has. Currently recognized + * values are minter, burner and staking. + */ + permissions: string[]; +} + +function createBaseModule(): Module { + return { authority: "" }; +} + +export const Module = { + encode(message: Module, writer: _m0.Writer = _m0.Writer.create()): _m0.Writer { + if (message.authority !== "") { + writer.uint32(10).string(message.authority); + } + return writer; + }, + + decode(input: _m0.Reader | Uint8Array, length?: number): Module { + const reader = input instanceof _m0.Reader ? input : _m0.Reader.create(input); + let end = length === undefined ? reader.len : reader.pos + length; + const message = createBaseModule(); + while (reader.pos < end) { + const tag = reader.uint32(); + switch (tag >>> 3) { + case 1: + if (tag !== 10) { + break; + } + + message.authority = reader.string(); + continue; + } + if ((tag & 7) === 4 || tag === 0) { + break; + } + reader.skipType(tag & 7); + } + return message; + }, + + fromJSON(object: any): Module { + return { authority: isSet(object.authority) ? String(object.authority) : "" }; + }, + + toJSON(message: Module): unknown { + const obj: any = {}; + message.authority !== undefined && (obj.authority = message.authority); + return obj; + }, + + create, I>>(base?: I): Module { + return Module.fromPartial(base ?? {}); + }, + + fromPartial, I>>(object: I): Module { + const message = createBaseModule(); + message.authority = object.authority ?? ""; + return message; + }, +}; + +function createBaseModuleAccountPermission(): ModuleAccountPermission { + return { account: "", permissions: [] }; +} + +export const ModuleAccountPermission = { + encode(message: ModuleAccountPermission, writer: _m0.Writer = _m0.Writer.create()): _m0.Writer { + if (message.account !== "") { + writer.uint32(10).string(message.account); + } + for (const v of message.permissions) { + writer.uint32(18).string(v!); + } + return writer; + }, + + decode(input: _m0.Reader | Uint8Array, length?: number): ModuleAccountPermission { + const reader = input instanceof _m0.Reader ? input : _m0.Reader.create(input); + let end = length === undefined ? reader.len : reader.pos + length; + const message = createBaseModuleAccountPermission(); + while (reader.pos < end) { + const tag = reader.uint32(); + switch (tag >>> 3) { + case 1: + if (tag !== 10) { + break; + } + + message.account = reader.string(); + continue; + case 2: + if (tag !== 18) { + break; + } + + message.permissions.push(reader.string()); + continue; + } + if ((tag & 7) === 4 || tag === 0) { + break; + } + reader.skipType(tag & 7); + } + return message; + }, + + fromJSON(object: any): ModuleAccountPermission { + return { + account: isSet(object.account) ? String(object.account) : "", + permissions: Array.isArray(object?.permissions) ? object.permissions.map((e: any) => String(e)) : [], + }; + }, + + toJSON(message: ModuleAccountPermission): unknown { + const obj: any = {}; + message.account !== undefined && (obj.account = message.account); + if (message.permissions) { + obj.permissions = message.permissions.map((e) => e); + } else { + obj.permissions = []; + } + return obj; + }, + + create, I>>(base?: I): ModuleAccountPermission { + return ModuleAccountPermission.fromPartial(base ?? {}); + }, + + fromPartial, I>>(object: I): ModuleAccountPermission { + const message = createBaseModuleAccountPermission(); + message.account = object.account ?? ""; + message.permissions = object.permissions?.map((e) => e) || []; + return message; + }, +}; + +type Builtin = Date | Function | Uint8Array | string | number | boolean | undefined; + +type DeepPartial = T extends Builtin ? T + : T extends Long ? string | number | Long : T extends Array ? Array> + : T extends ReadonlyArray ? ReadonlyArray> + : T extends {} ? { [K in keyof T]?: DeepPartial } + : Partial; + +type KeysOfUnion = T extends T ? keyof T : never; +type Exact = P extends Builtin ? P + : P & { [K in keyof P]: Exact } & { [K in Exclude>]: never }; + +if (_m0.util.Long !== Long) { + _m0.util.Long = Long as any; + _m0.configure(); +} + +function isSet(value: any): boolean { + return value !== null && value !== undefined; +} diff --git a/src/protojs/index.eth.evm.v1.ts b/src/protojs/index.eth.evm.v1.ts index f3179cbd..4e16621b 100644 --- a/src/protojs/index.eth.evm.v1.ts +++ b/src/protojs/index.eth.evm.v1.ts @@ -1,4 +1,4 @@ /* eslint-disable */ export * from "./eth/evm/v1/evm"; -export * from "./eth/evm/v1/events"; +export * from "./eth/evm/v1/tx"; diff --git a/src/protojs/index.nibiru.devgas.v1.ts b/src/protojs/index.nibiru.devgas.v1.ts index 143a15b9..c4ebcfe0 100644 --- a/src/protojs/index.nibiru.devgas.v1.ts +++ b/src/protojs/index.nibiru.devgas.v1.ts @@ -1,3 +1,5 @@ /* eslint-disable */ -export * from "./nibiru/devgas/v1/event"; +export * from "./nibiru/devgas/v1/devgas"; +export * from "./nibiru/devgas/v1/genesis"; +export * from "./nibiru/devgas/v1/tx"; diff --git a/src/protojs/index.nibiru.epochs.v1.ts b/src/protojs/index.nibiru.epochs.v1.ts index 2871806e..b814312d 100644 --- a/src/protojs/index.nibiru.epochs.v1.ts +++ b/src/protojs/index.nibiru.epochs.v1.ts @@ -1,3 +1,3 @@ /* eslint-disable */ -export * from "./nibiru/epochs/v1/event"; +export * from "./nibiru/epochs/v1/state"; diff --git a/src/protojs/index.nibiru.evm.module.ts b/src/protojs/index.nibiru.evm.module.ts new file mode 100644 index 00000000..31c1327e --- /dev/null +++ b/src/protojs/index.nibiru.evm.module.ts @@ -0,0 +1,3 @@ +/* eslint-disable */ + +export * as v1 from "./index.nibiru.evm.module.v1"; diff --git a/src/protojs/index.nibiru.evm.module.v1.ts b/src/protojs/index.nibiru.evm.module.v1.ts new file mode 100644 index 00000000..fe36f48c --- /dev/null +++ b/src/protojs/index.nibiru.evm.module.v1.ts @@ -0,0 +1,3 @@ +/* eslint-disable */ + +export * from "./eth/evm/module/module"; diff --git a/src/protojs/index.nibiru.evm.ts b/src/protojs/index.nibiru.evm.ts new file mode 100644 index 00000000..7cd34ad4 --- /dev/null +++ b/src/protojs/index.nibiru.evm.ts @@ -0,0 +1,3 @@ +/* eslint-disable */ + +export * as module from "./index.nibiru.evm.module"; diff --git a/src/protojs/index.nibiru.inflation.v1.ts b/src/protojs/index.nibiru.inflation.v1.ts index 3de5b9db..fe47db74 100644 --- a/src/protojs/index.nibiru.inflation.v1.ts +++ b/src/protojs/index.nibiru.inflation.v1.ts @@ -1,3 +1,4 @@ /* eslint-disable */ -export * from "./nibiru/inflation/v1/event"; +export * from "./nibiru/inflation/v1/inflation"; +export * from "./nibiru/inflation/v1/tx"; diff --git a/src/protojs/index.nibiru.oracle.v1.ts b/src/protojs/index.nibiru.oracle.v1.ts index b22bf545..62f33089 100644 --- a/src/protojs/index.nibiru.oracle.v1.ts +++ b/src/protojs/index.nibiru.oracle.v1.ts @@ -1,4 +1,4 @@ /* eslint-disable */ export * from "./nibiru/oracle/v1/oracle"; -export * from "./nibiru/oracle/v1/event"; +export * from "./nibiru/oracle/v1/tx"; diff --git a/src/protojs/index.nibiru.sudo.v1.ts b/src/protojs/index.nibiru.sudo.v1.ts index 545236d3..a58d6c45 100644 --- a/src/protojs/index.nibiru.sudo.v1.ts +++ b/src/protojs/index.nibiru.sudo.v1.ts @@ -1,4 +1,3 @@ /* eslint-disable */ -export * from "./nibiru/sudo/v1/state"; -export * from "./nibiru/sudo/v1/event"; +export * from "./nibiru/sudo/v1/tx"; diff --git a/src/protojs/index.nibiru.tokenfactory.module.ts b/src/protojs/index.nibiru.tokenfactory.module.ts new file mode 100644 index 00000000..148ce8d1 --- /dev/null +++ b/src/protojs/index.nibiru.tokenfactory.module.ts @@ -0,0 +1,3 @@ +/* eslint-disable */ + +export * as v1 from "./index.nibiru.tokenfactory.module.v1"; diff --git a/src/protojs/index.nibiru.tokenfactory.module.v1.ts b/src/protojs/index.nibiru.tokenfactory.module.v1.ts new file mode 100644 index 00000000..7d97cf45 --- /dev/null +++ b/src/protojs/index.nibiru.tokenfactory.module.v1.ts @@ -0,0 +1,3 @@ +/* eslint-disable */ + +export * from "./nibiru/tokenfactory/module/module"; diff --git a/src/protojs/index.nibiru.tokenfactory.v1.ts b/src/protojs/index.nibiru.tokenfactory.v1.ts index 89e2a7c2..ec2bd889 100644 --- a/src/protojs/index.nibiru.tokenfactory.v1.ts +++ b/src/protojs/index.nibiru.tokenfactory.v1.ts @@ -1,3 +1,4 @@ /* eslint-disable */ -export * from "./nibiru/tokenfactory/v1/event"; +export * from "./nibiru/tokenfactory/v1/state"; +export * from "./nibiru/tokenfactory/v1/tx"; diff --git a/src/protojs/nibiru/oracle/v1/oracle.ts b/src/protojs/nibiru/oracle/v1/oracle.ts index bc8ce253..ba9f323a 100644 --- a/src/protojs/nibiru/oracle/v1/oracle.ts +++ b/src/protojs/nibiru/oracle/v1/oracle.ts @@ -14,7 +14,7 @@ export interface Params { */ voteThreshold: string; /** - * RewardBand defines a maxium divergence that a price vote can have from the + * RewardBand defines a maximum divergence that a price vote can have from the * weighted median in the ballot. If a vote lies within the valid range * defined by: * μ := weightedMedian, diff --git a/src/protojs/nibiru/sudo/v1/event.ts b/src/protojs/nibiru/sudo/v1/event.ts index aacd1540..3dc4c445 100644 --- a/src/protojs/nibiru/sudo/v1/event.ts +++ b/src/protojs/nibiru/sudo/v1/event.ts @@ -6,7 +6,7 @@ import { Sudoers } from "./state"; /** EventUpdateSudoers: ABCI event emitted upon execution of "MsgEditSudoers". */ export interface EventUpdateSudoers { sudoers?: Sudoers; - /** Action is the type of update that occured to the "sudoers" */ + /** Action is the type of update that occurred to the "sudoers" */ action: string; } diff --git a/src/protojs/nibiru/tokenfactory/module/module.ts b/src/protojs/nibiru/tokenfactory/module/module.ts new file mode 100644 index 00000000..3d1051b6 --- /dev/null +++ b/src/protojs/nibiru/tokenfactory/module/module.ts @@ -0,0 +1,172 @@ +/* eslint-disable */ +import Long from "long"; +import _m0 from "protobufjs/minimal"; + +/** Module is the config object for the tokenfactory module. */ +export interface Module { + /** authority defines the custom module authority. If not set, defaults to the governance module. */ + authority: string; +} + +/** ModuleAccountPermission represents permissions for a module account. */ +export interface ModuleAccountPermission { + /** account is the name of the module. */ + account: string; + /** + * permissions are the permissions this module has. Currently recognized + * values are minter, burner and staking. + */ + permissions: string[]; +} + +function createBaseModule(): Module { + return { authority: "" }; +} + +export const Module = { + encode(message: Module, writer: _m0.Writer = _m0.Writer.create()): _m0.Writer { + if (message.authority !== "") { + writer.uint32(10).string(message.authority); + } + return writer; + }, + + decode(input: _m0.Reader | Uint8Array, length?: number): Module { + const reader = input instanceof _m0.Reader ? input : _m0.Reader.create(input); + let end = length === undefined ? reader.len : reader.pos + length; + const message = createBaseModule(); + while (reader.pos < end) { + const tag = reader.uint32(); + switch (tag >>> 3) { + case 1: + if (tag !== 10) { + break; + } + + message.authority = reader.string(); + continue; + } + if ((tag & 7) === 4 || tag === 0) { + break; + } + reader.skipType(tag & 7); + } + return message; + }, + + fromJSON(object: any): Module { + return { authority: isSet(object.authority) ? String(object.authority) : "" }; + }, + + toJSON(message: Module): unknown { + const obj: any = {}; + message.authority !== undefined && (obj.authority = message.authority); + return obj; + }, + + create, I>>(base?: I): Module { + return Module.fromPartial(base ?? {}); + }, + + fromPartial, I>>(object: I): Module { + const message = createBaseModule(); + message.authority = object.authority ?? ""; + return message; + }, +}; + +function createBaseModuleAccountPermission(): ModuleAccountPermission { + return { account: "", permissions: [] }; +} + +export const ModuleAccountPermission = { + encode(message: ModuleAccountPermission, writer: _m0.Writer = _m0.Writer.create()): _m0.Writer { + if (message.account !== "") { + writer.uint32(10).string(message.account); + } + for (const v of message.permissions) { + writer.uint32(18).string(v!); + } + return writer; + }, + + decode(input: _m0.Reader | Uint8Array, length?: number): ModuleAccountPermission { + const reader = input instanceof _m0.Reader ? input : _m0.Reader.create(input); + let end = length === undefined ? reader.len : reader.pos + length; + const message = createBaseModuleAccountPermission(); + while (reader.pos < end) { + const tag = reader.uint32(); + switch (tag >>> 3) { + case 1: + if (tag !== 10) { + break; + } + + message.account = reader.string(); + continue; + case 2: + if (tag !== 18) { + break; + } + + message.permissions.push(reader.string()); + continue; + } + if ((tag & 7) === 4 || tag === 0) { + break; + } + reader.skipType(tag & 7); + } + return message; + }, + + fromJSON(object: any): ModuleAccountPermission { + return { + account: isSet(object.account) ? String(object.account) : "", + permissions: Array.isArray(object?.permissions) ? object.permissions.map((e: any) => String(e)) : [], + }; + }, + + toJSON(message: ModuleAccountPermission): unknown { + const obj: any = {}; + message.account !== undefined && (obj.account = message.account); + if (message.permissions) { + obj.permissions = message.permissions.map((e) => e); + } else { + obj.permissions = []; + } + return obj; + }, + + create, I>>(base?: I): ModuleAccountPermission { + return ModuleAccountPermission.fromPartial(base ?? {}); + }, + + fromPartial, I>>(object: I): ModuleAccountPermission { + const message = createBaseModuleAccountPermission(); + message.account = object.account ?? ""; + message.permissions = object.permissions?.map((e) => e) || []; + return message; + }, +}; + +type Builtin = Date | Function | Uint8Array | string | number | boolean | undefined; + +type DeepPartial = T extends Builtin ? T + : T extends Long ? string | number | Long : T extends Array ? Array> + : T extends ReadonlyArray ? ReadonlyArray> + : T extends {} ? { [K in keyof T]?: DeepPartial } + : Partial; + +type KeysOfUnion = T extends T ? keyof T : never; +type Exact = P extends Builtin ? P + : P & { [K in keyof P]: Exact } & { [K in Exclude>]: never }; + +if (_m0.util.Long !== Long) { + _m0.util.Long = Long as any; + _m0.configure(); +} + +function isSet(value: any): boolean { + return value !== null && value !== undefined; +}