DAO commands
The
aragon dao
commands can be used for interacting with your DAO directly from the command line. These commands are also available directly using the dao
alias.Note
The default mnemonic of the Aragon CLI is the same for all users. If you are going to deploy a DAO to public networks it is highly recommended that you use your own web3 provider. Instructions on that can be found here (scroll down to 'Set a private key').
Uses a DAO Template to create a new DAO and prints its address.
dao new
Options:
--environment
: The environment in yourarapp.json
that you want to use. Defaults toaragon:local
. Check the other default environments. You can also use it with the--env
alias.--use-frame
: Use Frame as a signing provider and web3 provider.--aragon-id
: Assigns an Aragon Id to the DAO.--template
: The aragonPM repo name of the template that is used to create the DAO. Defaults tobare-template.aragonpm.eth
.--template-version [version-number|latest]
: The version of the repo that will be used to create the DAO. Defaults tolatest
.--fn
: The function on the template that is called to create a new DAO. Defaults to thenewInstance
function forbare-template.aragonpm.eth
.--fn-args
: The arguments that the function to create the template is called with. Defaults to an array of arguments. To use arrays use the following format["'0xB24b...73a7', '0xB24b...73a7'"]
.--deploy-event
: The name of the event that is emitted when the DAO is created. The DAO address must be a return argument in the event log nameddao
. Defaults toDeployDao
.--ipfs-check
: Whether to have start IPFS if not started. Defaults totrue
.
Used to inspect all the installed apps in a DAO.
dao apps <dao-addr>
dao-addr
: The main address of the DAO (Kernel).
Options:
--all
: To include apps without permissions in the report.
Assigns an Aragon Id to a DAO address.
dao id assign <dao> <aragon-id>
or
dao id <dao> <aragon-id>
dao
: The main address of the DAO (Kernel).aragon-id
: The Aragon Id.
The
dao install
command installs an instance of an app in the DAO.dao install <dao-addr> <app-apm-repo> [repo-version]
dao-addr
: The main address of the DAO (Kernel).app-apm-repo
: The repo name of the app being installed (e.g.voting
orvoting.aragonpm.eth
).repo-version
: (optional) Version of the repo that will be installed; can be a version number orlatest
for the newest published version. Defaults tolatest
.
In aragonOS an app is considered to be installed in a DAO if it uses the DAO Kernel as its Kernel and there are references to the app in the ACL of the DAO.
The
dao install
command will create an instance of the app and assign permissions to the main account to perform all the protected actions in the app.Options:
--app-init
: Name of the function that will be called to initialize an app. If you want to skip app initialization (which is not generally recommended), you can do it by set it tonone
. By default it will initialize the app usinginitialize
function.--app-init-args
: Arguments for calling the app init function. To use arrays use the following format["'0xB24b...73a7', '0xB24b...73a7'"]
.--set-permissions
: Whether to set permissions in the app. Set it toopen
to allowANY_ENTITY
on all roles.
Note
All app instances of the same app in a DAO must run the same version, so installing an app with a version will effectively upgrade all app instances to this version.
The
dao upgrade
command upgrades all instances of an app to a newer version.dao upgrade <dao-addr> <app-apm-repo> [repo-version]
dao-addr
: The main address of the DAO (Kernel).app-apm-repo
: The repo name of the app being upgraded (e.g.voting
orvoting.aragonpm.eth
).repo-version
: Version of the repo that the app will be upgraded to; can be a version number orlatest
for the newest published version (defaults tolatest
).
aragonOS protects against having different instances of a particular app running with different versions (e.g. all the Voting app instances run the same version). Performing a
dao upgrade
will upgrade all instances of the app to the version specified.Performs transactions in your DAO directly from aragonCLI. It supports transaction pathing so if your account cannot perform the action directly it will try to find how to do it (e.g. creating a vote).
dao exec <dao-addr> <app-proxy-addr> <method> [argument1 ... argumentN]
dao-addr
: The main address of the DAO (Kernel).app-proxy-addr
: The address of the app where the action is being performed. You can find the proxy address by checkingdao apps
.method
: Name of the method being executed in the app (e.g.withdrawTokens
).arguments
: The arguments that the method will be executed with (each separated by a space).
Provides some syntax sugar over
dao exec
for executing actions using Agent app instances in a DAO.dao act <agent-proxy> <target-addr> [method] [argument1 ... argumentN]
agent-proxy
: Address of the Agent app proxy.target-addr
: Address where the action is being executed.method
: The full signature of the method we wish to execute in either the external contract or the app we specified, note that by the full signature we mean the human readable function signature (e.g.vote(unint256,bool,bool)
).arguments
: The arguments that the method will be executed with (each separated by a space).
Options:
--call-data
: Raw call data.--eth-value
: Amount of ETH from the contract that is sent with the action.
Commands used to create and interact with the tokens your DAO will use.
dao token new <token-name> <symbol> [decimal-units] [transfer-enabled] [token-factory-address]
token-name
: Full name of the new Token.symbol
: Symbol of the new Token.decimal-units
: Total decimal units the new token will use. Defaults to18
.transfer-enabled
: Whether the new token will have transfers enabled. Defaults totrue
.token-factory-address
: Address of a MiniMe Token Factory deployed on the network. Defaults to an existing Minime Factory address for Rinkeby and Mainnet. Defaults to0xA29EF584c389c67178aE9152aC9C543f9156E2B3
on Mainnet and0xad991658443c56b3dE2D7d7f5d8C68F339aEef29
on Rinkeby.
Change the controller of a MiniMe token.
dao token change-controller <token-addr> <new-controller-addr>
token-addr
: Address of the token.new-controller-addr
: Address of the new controller.
Used to inspect the ACL state in a DAO to check its permissions.
dao acl <dao-addr>
dao-addr
: The main address of the DAO (Kernel).
Used to create a permission in the ACL. Can only be used if the permission hasn't been created before. The
manager
of the permission can use dao acl grant
and dao acl revoke
to manage the permission.dao acl create <dao-addr> <app-proxy-addr> <role> <entity> <manager>
dao-addr
: The main address of the DAO (Kernel).app-proxy-addr
: The address of the app whose permissions are being managed. You can find the proxy address by checkingdao apps
.role
: The identifier for the role. Can be thebytes32
identifier of the role or its name (e.g.INCREMENT_ROLE
).entity
: The address of the entity that is being granted the permission by creating it.manager
: The address of the entity that will be able to grant that permission or revoke it.
Used to grant a permission in the ACL.
dao acl grant <dao-addr> <app-proxy-addr> <role> <entity> [params...]
dao-addr
: The main address of the DAO (Kernel).app-proxy-addr
: The address of the app whose permissions are being managed. You can find the proxy address by checkingdao apps
.role
: The identifier for the role. Can be thebytes32
identifier of the role or its name (e.g.INCREMENT_ROLE
).entity
: The address of entity that is being granted the permission.params
: ACL parameters, with the following syntax:"<id>,<op>,<value>"
. Multiple parameters must be separated by spaces. See the ACL documentation for the list of available operators. Examples:"0,GT,2"
"2,EQ,0xC7f8dDbc7B3BFd432dEAc0CA270110467EcE01c3"
"LOGIC_OP_PARAM_ID,OR,(1,2)"
"0,LT,4"
"1,EQ,42"
"LOGIC_OP_PARAM_ID,IF_ELSE,(1,2,3)"
"BLOCK_NUMBER_PARAM_ID,GT,1000"
"0,EQ,42"
"0,EQ,0"
Used to revoke a permission in the ACL.
dao acl revoke <dao-addr> <app-proxy-addr> <role> <entity>
dao-addr
: The main address of the DAO (Kernel).app-proxy-addr
: The address of the app whose permissions are being managed. You can find the proxy address by checkingdao apps
.role
: The identifier for the role. Can be thebytes32
identifier of the role or its name (e.g.INCREMENT_ROLE
).entity
: The address of entity that is being revoked the permission.
Used to change the manager of a permission in the ACL.
dao acl set-manager <dao-addr> <app-proxy-addr> <role> <manager>
dao-addr
: The main address of the DAO (Kernel).app-proxy-addr
: The address of the app whose permissions are being managed. You can find the proxy address by checkingdao apps
.role
: The identifier for the role. Can be thebytes32
identifier of the role or its name (e.g.INCREMENT_ROLE
).manager
: The new manager for the permission.
Used to remove the manager of a permission in the ACL. The permission can be created again after removing its manager.
dao acl remove-manager <dao-addr> <app-proxy-addr> <role>
dao-addr
: The main address of the DAO (Kernel).app-proxy-addr
: The address of the app whose permissions are being managed. You can find the proxy address by checkingdao apps
.role
: The identifier for the role. Can be thebytes32
identifier of the role or its name (e.g.INCREMENT_ROLE
).
Last modified 4mo ago