Skip to content

Commit 6a460f5

Browse files
committed
refactor: order admin addresses before permissions
1 parent 9bb6d46 commit 6a460f5

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

docs/concepts/11-governance.mdx

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,15 @@ Admin addresses that control the Comptroller are listed in the [Admin Addresses]
1717

1818
<ComptrollersTable />
1919

20+
## Admin Addresses
21+
22+
The Comptroller is introduced in Lockup v3.0, Airdrops v2.0 and Flow v2.0. For earlier versions, we use a direct "Admin"
23+
role for governance. These admin accounts have the same authority as the current Comptroller contract, with direct
24+
access to specific protocol functions. More concretely, the Admin is a collection of multisig wallets and EOAs currently
25+
in control of Sablier Labs.
26+
27+
<AdminsTable />
28+
2029
## Contract Permissions
2130

2231
### Lockup
@@ -48,15 +57,6 @@ Comptroller has the following permissions on each chain where Flow is deployed:
4857
| Set Native Token | [`setNativeToken`](/reference/flow/contracts/contract.SablierFlow#setnativetoken) |
4958
| Set NFT Descriptor | [`setNFTDescriptor`](/reference/flow/contracts/contract.SablierFlow#setnftdescriptor) |
5059

51-
## Admin Addresses
52-
53-
The Comptroller is introduced in Lockup v3.0, Airdrops v2.0 and Flow v2.0. For earlier versions, we use a direct "Admin"
54-
role for governance. These admin accounts have the same authority as the current Comptroller contract, with direct
55-
access to specific protocol functions. More concretely, the Admin is a collection of multisig wallets and EOAs currently
56-
in control of Sablier Labs.
57-
58-
<AdminsTable />
59-
6060
## Trustlessness
6161

6262
Despite having an admin, the Sablier Protocol remains trustless. Here's why:

0 commit comments

Comments
 (0)