diff --git a/contracts/src/access/control.rs b/contracts/src/access/control.rs index 57389d63..c3ca0e22 100644 --- a/contracts/src/access/control.rs +++ b/contracts/src/access/control.rs @@ -1,8 +1,7 @@ //! Contract module that allows children to implement role-based access control //! mechanisms. This is a lightweight version that doesn't allow enumerating //! role members except through off-chain means by accessing the contract event -//! logs. Some applications may benefit from on-chain enumerability, for those -//! cases see [`AccessControlEnumberable`][enumerable ext]. +//! logs. //! //! Roles are referred to by their `bytes32` identifier. These should be exposed //! in the external API and be unique. The best way to achieve this is by using @@ -41,8 +40,6 @@ //! accounts that have been granted it. We recommend using //! `AccessControlDefaultAdminRules` to enforce additional security measures for //! this role. -//! -//! [enumerable ext]: ./TODO use alloy_primitives::{Address, B256}; use alloy_sol_types::sol; use stylus_proc::SolidityError; @@ -388,7 +385,7 @@ mod tests { use super::{AccessControl, Error}; - /// Shorthand for declaring variables converted from a hex literla to a + /// Shorthand for declaring variables converted from a hex literal to a /// fixed 32-byte slice; macro_rules! roles { ($($var:ident = $hex:literal);* $(;)?) => { diff --git a/examples/access-control/tests/abi/mod.rs b/examples/access-control/tests/abi/mod.rs index c75c3713..1db8288b 100644 --- a/examples/access-control/tests/abi/mod.rs +++ b/examples/access-control/tests/abi/mod.rs @@ -4,8 +4,6 @@ use alloy::sol; sol!( #[sol(rpc)] contract AccessControl { - constructor(); - function hasRole(bytes32 role, address account) public view virtual returns (bool hasRole); function getRoleAdmin(bytes32 role) public view virtual returns (bytes32 role); function grantRole(bytes32 role, address account) public virtual;