LSP6 - Key Manager
Goal: allow multiple permissioned addresses to control and interact with a smart contract.
LSP6 - Key Manager, acts as the brain behind Universal Profiles, enabling sophisticated access control and interactions. Imagine having a digital identity that can interact with other contracts, manage assets, or even delegate actions without exposing your main account. This is where the Key Manager shines, serving as a permissioned gateway.
Here's how it works: You have a Universal Profile, essentially a smart contract account on the blockchain. This account can hold assets, manage permissions, and interact with other contracts. However, by itself, it's like a locked treasure chest. The Key Manager is the key to this chest, allowing specific actions to be performed by those you trust.
For instance, you can set permissions for different addresses, allowing them to perform specific actions such as sending transactions, managing assets, or setting data within your Universal Profile. This flexibility means you can have secure, controlled interactions on the blockchain, paving the way for more complex and secure applications.
Introductionβ
An LSP0ERC725Account on its own comes with limited usability. Since it is an owned contract, only the account's owner can write data into it or use it to interact with other smart contracts.
Here comes the Key Manager. A smart contract that controls a LSP0ERC725Account, acting as its new owner. It functions as a gateway for the account contract and allows not only one main contract owner but multiple controllers to interact with the LSP0ERC725Account.
What is a "controller"?
in the LSP6 Key Manager, the term "controller" refers to a permissioned address. These addresses have permissions that allow them to perform certain actions on the LSP0ERC725Account linked with the Key Manager (e.g., setting data or transferring LYX from the account).
Controllers can be Externally Owned Accounts (EOA) or smart contracts. The Key Manager will allow or restrict access based on the permissions set for the calling
address
.
Controllers can interact directly with the Key Manager or sign messages that can then be executed by any other parties (such as users or relay services).
β Β Without a Key Manager, only the LSP0ERC725Account's owner can use its Account.
β Β With a Key Manager attached to an LSP0ERC725Account, other addresses (EOAs or contracts) can use an Account on behalf of its owner.
Permissions for addresses are not stored on the Key Manager. Instead, they are stored inside the data key-value store of the LSP0ERC725Account linked to the Key Manager. This way, it is possible to easily upgrade the Key Manager without resetting all the permissions again.
Permissionsβ
You can use the encodePermissions(...)
and decodePermissions(...)
functions from the erc725.js tool to easily encode and decode permissions values or combine multiple permissions together.
While the Key Manager allows for a very fine-grained control over the Universal Profile (eg: CALL
permission combined with AllowedCalls
, SETDATA
permission combined with AllowedERC725YDataKeys
), it also allows for a very coarse-grained control over the Universal Profile, due to the SUPER
permissions. This makes the Key Manager very flexible, but that flexibility comes with a slightly higher responsibility from the users.
Good practices:
- Split the permissions over the Universal Profile accross different devices, hardware wallets or a combination of both.
- Make sure to double or triple check when granting permissions to 3rd parties (other Universal Profiles, DApps, etc.).
Click on the toggles below to learn more about the features enabled by each permission.
CHANGEOWNER
- Allows changing the owner of the controlled contract
value = 0x0000000000000000000000000000000000000000000000000000000000000001
The CHANGEOWNER
permission enables to change the owner of the linked ERC725Account.
Using this permission, you can easily upgrade the LSP6KeyManager
attached to the Account by transferring ownership to a new Key Manager.
ADDCONTROLLER
- Allows giving permissions to new controller addresses.
value = 0x0000000000000000000000000000000000000000000000000000000000000002
The ADDCONTROLLER
permission enables to grant permissions to new addresses that did not have any permissions before. This allows to add new permissioned addresses (controllers) that can then interact with or use the linked ERC725Account.
The ADDCONTROLLER
permission is needed to:
- Give a new address some permission(s) by setting its permissions under
AddressPermissions:Permissions:<controller-address>
(this is also refered to "adding a new controller") - Add a new controller address in the list of
AddressPermissions[index]
at a specificindex
. - Increase the length of the
AddressPermissions[]
Array length (to describe that a new controller has been added).
EDITPERMISSIONS
- Allows changing existing permissions of controllers.
value = 0x0000000000000000000000000000000000000000000000000000000000000004
Be aware that a controller with EDITPERMISSIONS
can also edit its own permissions!
This permission allows for editing permissions of any controller (permissioned address) that has some permissions already set on the ERC725Account (including itself, see warning above).
The EDITPERMISSIONS
is also needed to:
- ποΈ Remove a controller from the list of
AddressPermissions[]
, meaning:- removing the controller
address
at a specific index inAddressPermissions[index]
- decreasing the
AddressPermissions[]
Array length (to describe that a controller has been removed).
- removing the controller
- ποΈ Edit an entry in the
AddressPermissions[index]
Array, meaning changing the address stored at a specific index.
Bear in mind that the behavior of EDITPERMISSIONS
slightly varies depending on the new permissions value being set (see figure below).
ADDEXTENSIONS
- Allows adding new extension contracts on the linked ERC725Account.
value = 0x0000000000000000000000000000000000000000000000000000000000000008
The ADDEXTENSIONS
permission enables the addition of new LSP17 extension contracts for specific function selectors to be called when the account is called with a function that does not exist natively in its public interface. The fallback
function of the linked ERC725Account will handle the call to the extension set for the function selector being called.
CHANGEEXTENSIONS
- Allows editing the address for an extension contract on the linked ERC725Account.
value = 0x0000000000000000000000000000000000000000000000000000000000000010
The CHANGEEXTENSIONS
permission enables editing LSP17 extension contract addresses for function selectors already set in the account. The LSP17 extension will be called when the account is called with a function that does not exist natively in its public interface. The fallback
function of the linked ERC725Account will handle the call to the extension set for the function selector being called.
ADDUNIVERSALRECEIVERDELEGATE
- Allows adding new LSP1UniversalReceiverDelegate contracts addresses.
value = 0x0000000000000000000000000000000000000000000000000000000000000020
The ADDUNIVERSALRECEIVERDELEGATE
permission enables to add new LSP1UniversalReceiverDelegate extension contracts for specific Type IDs when no contracts extension was initially set up for a specific Type ID.
See LSP1 Universal Receiver > extension for more details.
NB this permission also enables to set the address of the default LSP1UniversalReceiverDelegate contract under the
LSP1UniversalReceiverDelegate
data key if no address was set in the first place.
CHANGEUNIVERSALRECEIVERDELEGATE
- Allows editing LSP1UniversalReceiverDelegate contracts addresses.
value = 0x0000000000000000000000000000000000000000000000000000000000000040
The CHANGEUNIVERSALRECEIVERDELEGATE
permission enables two things:
- edit the address of the default LSP1UniversalReceiverDelegate contract (linked under the
LSP1UniversalReceiverDelegate
data key). - edit the addresses of the LSP1UniversalReceiverDelegate extension contracts linked to specific Type IDs.
See LSP1 Universal Receiver > extension for more details.
REENTRANCY
- Allows reentering during an execution
value = 0x0000000000000000000000000000000000000000000000000000000000000080
The permission REENTRANCY
enables a controller to execute a payload during the execution of another payload.
Depending on if the controller is an EOA or a contract:
- A contract would reenter by using
execute(..)
- an EOA would do that through
executeRelayCall(..)
.
Example:
One of the best uses for this permission is the following scenario:
- The ERC725Acccount linked to the Key Manager makes an external call to a contract A.
- Contract A will make some internal updates using the received data.
- The contract A will then call back the ERC725Account (via the Key Manager) with another payload that will update the account storage.
In order for that interaction to happen the contract A must have the REENTRANCY
permission.
TRANSFERVALUE
- Allows to transfer native tokens from the linked ERC725Account's balance with restrictions.
value = 0x0000000000000000000000000000000000000000000000000000000000000200
The TRANSFERVALUE
permission enables to transfer the native tokens from the linked ERC725Account's balance with restrictions.
- to specific addresses (EOAs or contracts).
- to contracts implementing specific type of interfaces standards, that can be detected using ERC165 interfaces IDs.
Such restrictions can be applied using the LSP6 data AddressPermissions:AllowedCalls:<address>
, where <address>
is the address of the controller that has the TRANSFERVALUE
permission.
Note: For simple native token transfers, no data (
""
) should be passed to the fourth parameter of theexecute
function of the Account contract. For instance:account.execute(operationCall, recipient, amount, "")
The caller will need the permission
CALL
to send any data along the LYX transfer.
CALL
- Allows to use the linked ERC725Account to interact with contracts with restrictions.
value = 0x0000000000000000000000000000000000000000000000000000000000000800
The CALL
permission enables to use the linked ERC725Account to call functions on contracts deployed on the network with restrictions.
- to specific contract addresses (contracts).
- to contracts implementing specific type of interfaces standards, that can be detected using ERC165 interfaces IDs.
It uses the CALL
opcode, which allows to change states on the called contract.
STATICCALL
- Allows calling other contracts through the controlled contract with restrictions
value = 0x0000000000000000000000000000000000000000000000000000000000002000
This permission enables the ERC725Account linked to Key Manager to make external calls to contracts while disallowing state changes at the address being called.
It uses the STATICCALL opcode when performing the external call.
NB: If any state is changed at a target contract through a
STATICCALL
, the call will revert silently.
DELEGATECALL
- Allows delegate calling other contracts through the controlled contract with restrictions
value = 0x0000000000000000000000000000000000000000000000000000000000008000
This permission allows executing code and functions from other contracts in the UP context.
DELEGATECALL
is currently disallowed (even if set on the KeyManager) because of its dangerous nature, as vicious developers can execute some malicious code in the linked Account contract.
DEPLOY
- Allows deploying other contracts through the controlled contract
value = 0x0000000000000000000000000000000000000000000000000000000000010000
The permission DEPLOY
enables the controller to use the linked ERC725Account to deploy new smart contracts (the linked account will act as the deployer of the new contract).
Developers should provide the contract's bytecode to be deployed in the payload (ABI-encoded) passed to the Key Manager.
Both the
CREATE
orCREATE2
opcodes can be used to deploy a contract.
SETDATA
- Allows setting data on the controlled contract with restrictions
value = 0x0000000000000000000000000000000000000000000000000000000000040000
The permission SETDATA
allows a controller to write any form of data in the ERC725Y data key-value store of the linked ERC725Account
.
However, this permission restricts the controller to set data for only specific data keys set via allowed ERC725Y Data Keys
A controller with permission SETDATA
cannot set or edit data keys related to:
- permissions: requires the permission of
ADDCONTROLLER
orEDITPERMISSIONS
. - LSP1 data keys: requires the permission of
ADDUNIVERSALRECEIVERDELEGATE
orCHANGEUNIVERSALRECEIVERDELEGATE
. - LSP17 data keys: requires the permission of
ADDEXTENSIONS
orCHANGEEXTENSIONS
.
ENCRYPT
: Allows encrypting data or messages on behalf of the controlled account
value = 0x0000000000000000000000000000000000000000000000000000000000080000
Developers can use the ENCRYPT
permission to encrypt data or messages, for instance for private messaging.
DECRYPT
: Allows decrypting data or messages on behalf of the controlled account
value = 0x0000000000000000000000000000000000000000000000000000000000100000
Developers can use the DECRYPT
permission to decrypt data or messages, for instance for private messaging.
SIGN
: Allows signing on behalf of the controlled account, for example for login purposes
value = 0x0000000000000000000000000000000000000000000000000000000000200000
The permission SIGN
enables a controller to authenticate on behalf of the UP. It can be used primarily in Web 2.0 apps to sign login messages.
EXECUTE_RELAY_CALL
: Enables a controller's signed relay calls to be executable
value = 0x0000000000000000000000000000000000000000000000000000000000400000
The permission EXECUTE_RELAY_CALL
enables a controller's signed relay calls to be executable. This permission will be checked against the controller that signed the relay call.
SUPER Permissionsβ
The super permissions grant the same permissions as their non-super counterparts, with the difference being that the checks on restrictions for Allowed Calls and Allowed ERC725Y Data Keys are skipped.
The skip allows for cheaper transactions, whether these restrictions are set or not.
SUPER_TRANSFERVALUE
value = 0x0000000000000000000000000000000000000000000000000000000000000100
Same as TRANSFERVALUE
, but allowing to send native tokens to any address
(EOA or contract). This will also not check for Allowed Calls when transferring value to contracts.
SUPER_CALL
value = 0x0000000000000000000000000000000000000000000000000000000000000400
Same as CALL
, but it allows interacting with any contract. This will not check if the controller has any Allowed Calls restrictions set.
SUPER_STATICCALL
value = 0x0000000000000000000000000000000000000000000000000000000000001000
Same as STATICCALL
, but it allows interacting with any contract. This will not check if the controller has any Allowed Calls restrictions set.
SUPER_DELEGATECALL
value = 0x0000000000000000000000000000000000000000000000000000000000004000
Same as DELEGATECALL
, but allows interacting with any contract. This will not check if the controller has any Allowed Calls restrictions set.
SUPER_SETDATA
value = 0x0000000000000000000000000000000000000000000000000000000000020000
Same as SETDATA
, but allowing to set any ERC725Y data keys. This will not check for Allowed ERC725Y Data Keys if caller has any restrictions.
Use with caution: If the controller address has Allowed Calls or Allowed ERC725Y Data Keys restrictions set, they will be ignored.
Combining Permissionsβ
Permissions can be combined if a controller needs more than one permission. To do so:
- calculate the sum of the decimal value of each permission.
- convert the result back into hexadecimal.
Example
- Example 1
- Example 2
permissions: CALL + TRANSFERVALUE
0x0000000000000000000000000000000000000000000000000000000000000800 (2048 in decimal)
+ 0x0000000000000000000000000000000000000000000000000000000000000200 (512)
---------------------------------------------------------------------
= 0x0000000000000000000000000000000000000000000000000000000000000a00 (= 2560)
permissions: EDITPERMISSIONS + SETDATA
0x0000000000000000000000000000000000000000000000000000000000000004 (4 in decimal)
+ 0x0000000000000000000000000000000000000000000000000000000000040000 (262144)
---------------------------------------------------------------------
= 0x0000000000000000000000000000000000000000000000000000000000040004 (= 262148)
Retrieving list of controllersβ
The convenience function getData(...)
from erc725.js will return you the whole list of controllers when providing the AddressPermission[]
array data key as a parameter.
You can obtain the list of controllers that have some permissions on the linked ERC725Account by reading the AddressPermission[]
data key via getData(...)
.
- key:
0xdf30dba06db6a30e65354d9a64c609861f089545ca58c6b4dbe31a5f338cb0e3
- value return: the total number of address that have some permissions set (= array length)
Each controller can be retrieved by accessing each index in the array (see LSP2 > Array docs and LSP2 > Array Standard specs for more detailed instructions).
{
"name": "AddressPermissions[]",
"key": "0xdf30dba06db6a30e65354d9a64c609861f089545ca58c6b4dbe31a5f338cb0e3",
"keyType": "Array",
"valueType": "address",
"valueContent": "Address"
}
example:
if the AddressPermission[]
array data key returns 0x0000000000000000000000000000000000000000000000000000000000000004
(array length = 4), each controller can be obtained by reading the value under the following data keys:
0xdf30dba06db6a30e65354d9a64c6098600000000000000000000000000000000
: 1st controller (array index 0 =AddressPermissions[0]
)0xdf30dba06db6a30e65354d9a64c6098600000000000000000000000000000001
: 2nd controller (array index 1 =AddressPermissions[1]
)0xdf30dba06db6a30e65354d9a64c6098600000000000000000000000000000002
: 3rd controller (array index 2 =AddressPermissions[2]
)0xdf30dba06db6a30e65354d9a64c6098600000000000000000000000000000003
: 4th controller (array index 3 =AddressPermissions[3]
)
Types of permissionsβ
Permission Type | Description | bytes32 data key |
---|---|---|
Address Permissions | defines a set of permissions for a controller. | 0x4b80742de2bf82acb3630000<address> |
Allowed Calls | defines a set of interactions (action + address + function + standard) allowed for a controller. | 0x4b80742de2bf393a64c70000<address> |
Allowed ERC725Y Data Keys | defines a list of ERC725Y Data Keys a controller is only allowed to set via setData(...) on the linked ERC725Account. | 0x4b80742de2bf866c29110000<address> |
The values set under these permission data keys MUST be of the following format to ensure correct behavior of these functionalities.
- Address Permissions: a
bytes32
value. - Allowed Calls: a CompactBytesArray of the tuple
(bytes4,address,bytes4,bytes4)
. - Allowed ERC725Y Data Keys: a CompactBytesArray of bytes, containing values from
bytes1
tobytes32
.
To add or remove entries in the list of allowed calls or ERC725Y Data Keys, the whole compact bytes array should be encoded again and reset. Each update overrides the entire previous state. Note that this process can be expensive in gas, depending on the total number of allowed calls.
Address Permissionsβ
A controller can hold one (or more) permissions, enabling it to perform multiple "actions" on an ERC725Account. Such "actions" include setting data, calling other contracts, transferring native tokens, etc.
To grant permission(s) to a controller, set the following data key-value pair in the ERC725Y storage of the ERC725Account linked to the Key Manager.
- key:
0x4b80742de2bf82acb3630000<address>
- value: one of the available permission below. To give multiple permission, see the Combining permissions section.
NB: remember to remove the
0x
prefix in the<address>
field above.
{
"name": "AddressPermissions:Permissions:<address>",
"key": "0x4b80742de2bf82acb3630000<address>",
"keyType": "MappingWithGrouping",
"valueType": "bytes32",
"valueContent": "BitArray"
}
**Granting permissions to the linked ERC725Account itself is dangerous! **
A caller can craft a payload via ERC725X.execute(...)
to be sent back to the KeyManager, leading to potential re-entrancy attacks.
Such transaction flow can lead an initial caller to use more permissions than allowed initially by re-using the permissions granted to the linked ERC725Account's address.
Each permission MUST be exactly 32 bytes long and zero left-padded:
0x0000000000000000000000000000000000000000000000000000000000000008
β0x0800000000000000000000000000000000000000000000000000000000000000
β
For instance, if you try to set the permission TRANSFERVALUE for an address as 0x08
, this will be stored internally as 0x0800000000000000000000000000000000000000000000000000000000000000
.
Ensure the bytes32
value set under the permissions are correct according to these rules, to prevent incorrect or unexpected behaviour and errors.
Allowed Callsβ
You can restrict a controller permission (CALL
/TRANSFERVALUE
/etc..) to be valid with specific:
Call Types
Below is the list of Call Types and their possible combination.
call type | value |
---|---|
TRANSFERVALUE | 0x00000001 |
CALL | 0x00000002 |
STATICCALL | 0x00000004 |
DELEGATECALL | 0x00000008 |
Addresses
Address | Meaning |
---|---|
0xffffffffffffffffffffffffffffffffffffffff | Interaction with any address is allowed. |
Other addresses | Interaction with a specific address is allowed. |
Standards
These contracts MUST implement the ERC165 standard to be able to detect their interfaces.
Interface ID | Meaning |
---|---|
0xffffffff | Interaction with any standard is allowed. |
Specific interfaces | Interaction with a specific standard is allowed. |
Functions
Function Selector | Meaning |
---|---|
0xffffffff | Interaction with any function is allowed. |
Other function selectors | Interaction with a specific function is allowed. |
To restrict a controller to a specific set of calls, set the following data key-value pair in the ERC725Y storage of the ERC725Account linked to the Key Manager.
- key:
0x4b80742de2bf393a64c70000<controller-address>
- where
<address>
is the controlleraddress
- where
- possible values:
(bytes4,address,bytes4,bytes4)[CompactBytesArray]
: a CompactBytesArray of tuple which described the allowed call (call type + address + standard + function). See details below for each element of the tuple.0x
(empty): if the value is an empty byte (=0x
), the controller is not allowed to interact with any functions, address or standards (= all calls are disallowed).
Each entry in the CompactBytesArray is an Allowed Call. An Allowed Call is represented by a tuple of (bytes4,address,bytes4,bytes4)
, where each value in the tuple corresponds to the following:
bytes4
(call type) = the call type(s) allowed for this allowed call (TRANSFERVALUE
,CALL
,STATICCALL
andDELEGATECALL
).address
(address) = the address of an EOA or a contract. Can be used to restrict only to interact with a specific address.bytes4
(standard) = the ERC165 interface ID of a standard interface. Can be used to specify the "type of contract" allowed to interact with.bytes4
(function) = a bytes4 function selector. Can be used to restrict a controller to call only a specific function on a contract.
If you want to have multiple different interactions, you MUST add each of the desired interaction in the CompactBytesArray of AllowedCalls. Keep in mind that the length for each element in the CompactBytesArray must be 32 = 0x0020
, because the tuple (bytes4,address,bytes4,bytes4)
makes up 32 bytes in total.
Example 1: allow only to CALL
a specific LSP0 at a specific address
To allow a controller to only do CALL
to any function on a LSP0ERC725Account (interface ID 0x3e89ad98
) deployed at address 0xCA41e4ea94c8fA99889c8EA2c8948768cBaf4bc0
, the following value for the CompactBYytesArray of allowed calls will be used:
0x002000000002CA41e4ea94c8fA99889c8EA2c8948768cBaf4bc03e89ad98ffffffff
Where:
- element length:
0x0020
(= 32 bytes) - Call Type: CALL, 0x00000002;
- Address:
0xCA41e4ea94c8fA99889c8EA2c8948768cBaf4bc0
; - Standard: LSP0 interface ID =
0x3e89ad98
; - Function: any =
0xffffffff
;
Example 2: allow multiple interactions of different types
Consider the scenario where you want to give the following permissions to a controller:
- allow to
CALL
any functions (as well as transferring valueTRANSFERVALUE
) to a LSP0 contract deployed at address0xCA41e4ea94c8fA99889c8EA2c8948768cBaf4bc0
. - allow to
CALL
only thetransfer(address,address,uint256,bool,bytes)
function on the contract deployed at address0xF70Ce3b58f275A4c28d06C98615760dDe774DE57
. - allow to
TRANSFERVALUE
s while calling any functions on the contract deployed at address0xd3236aa1B8A4dDe5eA375fd1F2Fb5c354e686c9f
.
The CompactBytesArray of allowed calls for this controller will be composed of the following entries:
-
AllowedCalls[0]
= the 1st value in the CompactBytesArray will be0x002000000002CA41e4ea94c8fA99889c8EA2c8948768cBaf4bc03e89ad98ffffffff
.- Call Type: CALL and TRANSFERVALUE, 0x00000003;
- Address:
0xCA41e4ea94c8fA99889c8EA2c8948768cBaf4bc0
; - Standard: LSP0 interface ID =
0x3e89ad98
; - Function: any =
0xffffffff
;
-
AllowedCalls[1] = the 2nd value in the CompactBytesArray will be
0x002000000003F70Ce3b58f275A4c28d06C98615760dDe774DE57ffffffff760d9bba
.- Call Type: CALL, 0x00000002;
- Address:
0xF70Ce3b58f275A4c28d06C98615760dDe774DE57
; - Standard: any =
0xffffffff
; - Function: transfer(address,address,uint256,bool,bytes),
0x760d9bba
;
-
AllowedCalls[2] = the 3rd value in the CompactBytesArray will be
0x002000000004d3236aa1B8A4dDe5eA375fd1F2Fb5c354e686c9fffffffffffffffff
- Call Type: TRANSFERVALUE, 0x00000001;
- Address:
0xd3236aa1B8A4dDe5eA375fd1F2Fb5c354e686c9f
; - Standard: any =
0xffffffff
; - Function: any =
0xffffffff
;
A CompactBytesArray for these 3 interactions would look like this:
0x
0020
00000003CA41e4ea94c8fA99889c8EA2c8948768cBaf4bc03e89ad98ffffffff
0020
00000002F70Ce3b58f275A4c28d06C98615760dDe774DE57ffffffff760d9bba
0020
00000001d3236aa1B8A4dDe5eA375fd1F2Fb5c354e686c9fffffffffffffffff
{
"name": "AddressPermissions:AllowedCalls:<address>",
"key": "0x4b80742de2bf393a64c70000<address>",
"keyType": "MappingWithGrouping",
"valueType": "(bytes4,address,bytes4,bytes4)[CompactBytesArray]",
"valueContent": "(BitArray,Address,Bytes4,Bytes4)"
}
Allowing a specific standard does not offer security over the inner workings or the correctness of a smart contract. It should be used more as a "mistake prevention" mechanism than a security measure.
If no Allowed Calls are set (0x
), a controller cannot interact with any address nor transfer any value (Contract or EOA).
Allowed ERC725Y Data Keysβ
If a controller is allowed to SETDATA
on an ERC725Account, it is possible to restrict which data keys this address can set or update.
To restrict a controller to only be allowed to set the key LSP3Profile
(0x5ef83ad9559033e6e941db7d7c495acdce616347d28e90c7ce47cbfcfcad3bc5
), the following data key-value pair can be set in the ERC725Y contract storage. Encode data as a CompactBytesArray.
- key:
0x4b80742de2bf866c29110000<address>
- value(s):
0x00205ef83ad9559033e6e941db7d7c495acdce616347d28e90c7ce47cbfcfcad3bc5
ERC725Y Data Keys: fixed-size vs dynamic-size
Introduction (summary) You can set 2 types of ERC725Y Data Keys:
- Fixed-size Data Keys
A fixed-size Data Key is a data key with a fixed length of 32 bytes. If a controller address has a fixed-size allowed ERC725Y data key set, then that controller can only change the value of that specific fixed-size data key.
- Dynamic-size Data Keys
A dynamic-size Data Key is a data key with a variable length from 1 byte up to 31 bytes. If a controller has a dynamic-size allowed ERC725Y data key set, then that controller can change any data key that starts with the dynamic-size data key.
Examples:
- Fixed-size Data Keys
Let's imagine the following situation, you set an Allowed ERC725Y fixed-size Data Key (e.g. 0x5ef83ad9559033e6e941db7d7c495acdce616347d28e90c7ce47cbfcfcad3bc5
) for a controller (e.g. Alice).
With that setup you allowed Alice to update only the value of the Allowed ERC725Y Data Key.
- Dynamic-size Data Keys
Let's imagine the following situation: You set an Allowed ERC725Y dynamic-size Data Key (e.g., 0xbeefbeefbeefbeef
) for a controller (e.g., Bob).
With that setup you allowed Bob to set any Data Key that starts with 0xbeefbeefbeefbeef
.
E.g:
0xbeefbeefbeefbeefcafecafecafecafecafecafecafecafecafecafecafecafe
0xbeefbeefbeefbeef0000000000000000000000000000000000000000c629dfa8
0xbeefbeefbeefbeef000000000000000000000000000000000000000000001253
Combining multiple ERC725Y Data Keys
If you want to have multiple different ERC725Y data keys allowed, you MUST add each of the desired data keys to a CompactBytesArray.
E.g.:
0x5ef83ad9559033e6e941db7d7c495acdce616347d28e90c7ce47cbfcfcad3bc5
(length: 32 bytes =0x0020
)0x5ef83ad9559033e6e941db7d7c495acd
(length: 16 bytes =0x0010
)0xbeefbeef
(length: 4 bytes =0x0004
)
A CompactBytesArray for these 3 different ERC725Y Data Keys would look like this: 0x
0020
5ef83ad9559033e6e941db7d7c495acdce616347d28e90c7ce47cbfcfcad3bc5
0010
5ef83ad9559033e6e941db7d7c495acd
0004
beefbeef
{
"name": "AddressPermissions:AllowedERC725YDataKeys:<address>",
"key": "0x4b80742de2bf866c29110000<address>",
"keyType": "MappingWithGrouping",
"valueType": "bytes[CompactBytesArray]",
"valueContent": "Bytes"
}
Below is an example use case. An ERC725Account can allow some applications to add/edit informations on its storage via setData(...)
. The account can restrict such Dapps and protocols to edit the data keys that are only relevant to the logic of their applications.
As a result, this provide context for the Dapp on which data they can operate on the account, while preventing them to edit other information, such as the account metadata, or data relevant to other dapps.
If no Allowed ERC725Y Data Keys are set, the controller cannot set any value for any key.
Types of Executionβ
Since the LSP6 Key Manager incorporate the LSP20 Call Verification and the LSP25 Execute Relay Call standards, it allows to interact with the linked target contract in multiple ways.
Let's give some context to understand the different types of execution flow and the roles of each actor based on that.
- Alice: an end user who want to interact with a smart contract on-chain (or any dApp).
- Bob: an entity that act as a relayer, to send transactions of other users on their behalf and pay for their gas fees.
Note: "relayer" is a generic term that can refer to either Bob acting as:
- an individual (dispatching transactions to the network using its own private key)
- a business through a relayer service that he runs (where he might hold multiple private keys within its infrastructure that all dispatch transactions).
There are 3 ways to interact with the contract linked with the Key Manager.
Interaction type | Description | Characteristics |
---|---|---|
Direct execution via Key Manager | The end user (Alice) sends the payload directly to the Key Manager via execute(...) | Caller = end user (Alice). ππ» Alice pays for the gas fees. |
Relay execution via Key Manager | The end user (Alice) signs a payload using the LSP25 signature format. A relayer (Bob) dispatches the transaction for the user to the Key Manager via executeRelayCall(...) . | Caller = relayer (Bob). The signer is the end user (Alice). ππ» Alice does not pay for the gas fees (this method allows Alice to offload her gas fees to Bob). |
Direct execution on the target contract (e.g: a π) verified via LSP20-CallVerification | The end user (Alice) interacts directly with the target contract (e.g., a Universal Profile) by calling any of its public functions. This bypasses the Key Manager, sending the call directly to the contract. The contract will forward the call to the Key Managerβs lsp20VerifyCall function for permission verification. | Caller = end user (Alice). ππ» Alice pays for the gas fees. ππ» User can call the function directly on the contract without going through the Key Manager. ππ» Simplifies interaction. No need to abi-encode function call first and send the encoded payload to the Key Manager. |
Note: the payload corresponds to the abi-encoded function call on the contract linked to the Key Manager.
Example: if the contract linked to the Key Manager is a Universal Profile, the payload can be the abi-encoded function call of
setData
,setDataBatch
,execute
,executeBatch
,transferOwnership
oracceptOwnership
In all cases, whether the end user interacts directly or via relayer, it must have the right permissions on the contract linked to the Key Manager for the action it is trying to perform (e.g: permission SETDATA
+ relevant Allowed Data Keys if doing setData
or setDataBatch
, permission SUPER_TRANSFERVALUE
if trying to send native tokens out of the contract, etc...).
Direct & Relay execution via the Key Managerβ
When signing relay calls with the LSP25 signature format, make sure to use the Key Manager's address as the 3rd parameter (LSP25 Implementation address) of the data to sign. See Standards > LSP25 > Parameters to generate a LSP25 signature for more details.
See our Learn section for a Key Manager guide on How to sign and execute relay transactions
In the case of direct execution, the user (being a permissioned address) is the caller (msg.sender
) and call the execute(...)
function on the Key Manager.
In the case of relay execution, the permissioned address A signs a payload and the relay service B executes the payload on behalf of the signer via executeRelayCall(...)
.
Direct execution to the target contract thanks to LSP20β
Since the LSP6 Key Manager supports the LSP20 standard, interaction with the linked contract (like an ERC725Account owned by a Key Manager in the case of the UP Browser Extension) can be done directly, in accordance with the LSP20-CallVerification standard.
The call will be forwarded to the LSP20 functions of the Key Manager and the LSP20 functions will verify the necessary permissions and emit the relevant event.