2015-06-08 15:50:35 +00:00
|
|
|
/*
|
2015-10-12 17:48:40 +00:00
|
|
|
* Copyright (c) 2015 Cryptonomex, Inc., and contributors.
|
|
|
|
|
*
|
2016-01-06 09:51:18 +00:00
|
|
|
* The MIT License
|
2015-10-12 17:48:40 +00:00
|
|
|
*
|
2016-01-06 09:51:18 +00:00
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
|
|
|
* of this software and associated documentation files (the "Software"), to deal
|
|
|
|
|
* in the Software without restriction, including without limitation the rights
|
|
|
|
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
|
|
|
* copies of the Software, and to permit persons to whom the Software is
|
|
|
|
|
* furnished to do so, subject to the following conditions:
|
2015-10-12 17:48:40 +00:00
|
|
|
*
|
2016-01-06 09:51:18 +00:00
|
|
|
* The above copyright notice and this permission notice shall be included in
|
|
|
|
|
* all copies or substantial portions of the Software.
|
2015-10-12 17:02:59 +00:00
|
|
|
*
|
2016-01-06 09:51:18 +00:00
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
|
|
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
|
|
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
|
|
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
|
|
|
|
* THE SOFTWARE.
|
2015-06-08 15:50:35 +00:00
|
|
|
*/
|
2015-07-16 22:13:11 +00:00
|
|
|
#include <graphene/chain/exceptions.hpp>
|
|
|
|
|
#include <graphene/chain/protocol/fee_schedule.hpp>
|
2015-06-08 15:50:35 +00:00
|
|
|
#include <fc/io/raw.hpp>
|
2015-07-02 19:04:43 +00:00
|
|
|
#include <fc/bitutil.hpp>
|
2015-07-20 18:57:08 +00:00
|
|
|
#include <fc/smart_ref_impl.hpp>
|
2015-07-10 15:55:12 +00:00
|
|
|
#include <algorithm>
|
2015-06-08 15:50:35 +00:00
|
|
|
|
|
|
|
|
namespace graphene { namespace chain {
|
|
|
|
|
|
|
|
|
|
digest_type processed_transaction::merkle_digest()const
|
|
|
|
|
{
|
2015-08-06 16:41:45 +00:00
|
|
|
digest_type::encoder enc;
|
|
|
|
|
fc::raw::pack( enc, *this );
|
|
|
|
|
return enc.result();
|
2015-06-08 15:50:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
digest_type transaction::digest()const
|
|
|
|
|
{
|
|
|
|
|
digest_type::encoder enc;
|
|
|
|
|
fc::raw::pack( enc, *this );
|
|
|
|
|
return enc.result();
|
|
|
|
|
}
|
2015-08-06 16:41:45 +00:00
|
|
|
|
|
|
|
|
digest_type transaction::sig_digest( const chain_id_type& chain_id )const
|
|
|
|
|
{
|
|
|
|
|
digest_type::encoder enc;
|
|
|
|
|
fc::raw::pack( enc, chain_id );
|
|
|
|
|
fc::raw::pack( enc, *this );
|
|
|
|
|
return enc.result();
|
|
|
|
|
}
|
|
|
|
|
|
2015-06-08 15:50:35 +00:00
|
|
|
void transaction::validate() const
|
|
|
|
|
{
|
2015-07-24 15:37:37 +00:00
|
|
|
FC_ASSERT( operations.size() > 0, "A transaction must have at least one operation", ("trx",*this) );
|
2015-06-08 15:50:35 +00:00
|
|
|
for( const auto& op : operations )
|
2015-07-07 14:57:01 +00:00
|
|
|
operation_validate(op);
|
2015-06-08 15:50:35 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
graphene::chain::transaction_id_type graphene::chain::transaction::id() const
|
|
|
|
|
{
|
2015-08-06 16:41:45 +00:00
|
|
|
auto h = digest();
|
2015-06-08 15:50:35 +00:00
|
|
|
transaction_id_type result;
|
2015-08-06 16:41:45 +00:00
|
|
|
memcpy(result._hash, h._hash, std::min(sizeof(result), sizeof(h)));
|
2015-06-08 15:50:35 +00:00
|
|
|
return result;
|
|
|
|
|
}
|
2015-07-02 16:58:21 +00:00
|
|
|
|
2015-08-06 16:41:45 +00:00
|
|
|
const signature_type& graphene::chain::signed_transaction::sign(const private_key_type& key, const chain_id_type& chain_id)
|
2015-06-08 15:50:35 +00:00
|
|
|
{
|
2015-08-06 16:41:45 +00:00
|
|
|
digest_type h = sig_digest( chain_id );
|
|
|
|
|
signatures.push_back(key.sign_compact(h));
|
2015-07-10 19:56:44 +00:00
|
|
|
return signatures.back();
|
|
|
|
|
}
|
2015-08-06 16:41:45 +00:00
|
|
|
|
|
|
|
|
signature_type graphene::chain::signed_transaction::sign(const private_key_type& key, const chain_id_type& chain_id)const
|
2015-07-10 19:56:44 +00:00
|
|
|
{
|
2015-08-06 16:41:45 +00:00
|
|
|
digest_type::encoder enc;
|
|
|
|
|
fc::raw::pack( enc, chain_id );
|
|
|
|
|
fc::raw::pack( enc, *this );
|
|
|
|
|
return key.sign_compact(enc.result());
|
2015-06-28 20:16:24 +00:00
|
|
|
}
|
2015-07-02 16:58:21 +00:00
|
|
|
|
|
|
|
|
void transaction::set_expiration( fc::time_point_sec expiration_time )
|
|
|
|
|
{
|
2015-07-14 22:46:58 +00:00
|
|
|
expiration = expiration_time;
|
2015-07-02 16:58:21 +00:00
|
|
|
}
|
|
|
|
|
|
2015-07-14 22:46:58 +00:00
|
|
|
void transaction::set_reference_block( const block_id_type& reference_block )
|
2015-07-02 16:28:15 +00:00
|
|
|
{
|
2015-07-02 19:04:43 +00:00
|
|
|
ref_block_num = fc::endian_reverse_u32(reference_block._hash[0]);
|
2015-07-02 16:28:15 +00:00
|
|
|
ref_block_prefix = reference_block._hash[1];
|
|
|
|
|
}
|
2015-07-14 21:28:26 +00:00
|
|
|
|
2015-07-10 19:56:44 +00:00
|
|
|
void transaction::get_required_authorities( flat_set<account_id_type>& active, flat_set<account_id_type>& owner, vector<authority>& other )const
|
2015-07-07 14:57:01 +00:00
|
|
|
{
|
|
|
|
|
for( const auto& op : operations )
|
2015-07-08 20:39:23 +00:00
|
|
|
operation_get_required_authorities( op, active, owner, other );
|
2015-07-07 14:57:01 +00:00
|
|
|
}
|
2015-06-08 15:50:35 +00:00
|
|
|
|
2015-07-16 22:13:11 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2015-07-10 19:56:44 +00:00
|
|
|
struct sign_state
|
|
|
|
|
{
|
|
|
|
|
/** returns true if we have a signature for this key or can
|
|
|
|
|
* produce a signature for this key, else returns false.
|
|
|
|
|
*/
|
|
|
|
|
bool signed_by( const public_key_type& k )
|
|
|
|
|
{
|
2015-07-16 22:13:11 +00:00
|
|
|
auto itr = provided_signatures.find(k);
|
|
|
|
|
if( itr == provided_signatures.end() )
|
2015-07-10 19:56:44 +00:00
|
|
|
{
|
2015-07-16 22:13:11 +00:00
|
|
|
auto pk = available_keys.find(k);
|
|
|
|
|
if( pk != available_keys.end() )
|
|
|
|
|
return provided_signatures[k] = true;
|
2015-07-10 19:56:44 +00:00
|
|
|
return false;
|
|
|
|
|
}
|
2015-07-16 22:13:11 +00:00
|
|
|
return itr->second = true;
|
|
|
|
|
}
|
|
|
|
|
|
2015-09-24 14:10:36 +00:00
|
|
|
optional<map<address,public_key_type>> available_address_sigs;
|
|
|
|
|
optional<map<address,public_key_type>> provided_address_sigs;
|
|
|
|
|
|
|
|
|
|
bool signed_by( const address& a ) {
|
|
|
|
|
if( !available_address_sigs ) {
|
|
|
|
|
available_address_sigs = std::map<address,public_key_type>();
|
|
|
|
|
provided_address_sigs = std::map<address,public_key_type>();
|
|
|
|
|
for( auto& item : available_keys ) {
|
|
|
|
|
(*available_address_sigs)[ address(pts_address(item, false, 56) ) ] = item;
|
|
|
|
|
(*available_address_sigs)[ address(pts_address(item, true, 56) ) ] = item;
|
|
|
|
|
(*available_address_sigs)[ address(pts_address(item, false, 0) ) ] = item;
|
|
|
|
|
(*available_address_sigs)[ address(pts_address(item, true, 0) ) ] = item;
|
|
|
|
|
(*available_address_sigs)[ address(item) ] = item;
|
|
|
|
|
}
|
|
|
|
|
for( auto& item : provided_signatures ) {
|
|
|
|
|
(*provided_address_sigs)[ address(pts_address(item.first, false, 56) ) ] = item.first;
|
|
|
|
|
(*provided_address_sigs)[ address(pts_address(item.first, true, 56) ) ] = item.first;
|
|
|
|
|
(*provided_address_sigs)[ address(pts_address(item.first, false, 0) ) ] = item.first;
|
|
|
|
|
(*provided_address_sigs)[ address(pts_address(item.first, true, 0) ) ] = item.first;
|
|
|
|
|
(*provided_address_sigs)[ address(item.first) ] = item.first;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
auto itr = provided_address_sigs->find(a);
|
|
|
|
|
if( itr == provided_address_sigs->end() )
|
|
|
|
|
{
|
|
|
|
|
auto aitr = available_address_sigs->find(a);
|
|
|
|
|
if( aitr != available_address_sigs->end() ) {
|
|
|
|
|
auto pk = available_keys.find(aitr->second);
|
|
|
|
|
if( pk != available_keys.end() )
|
|
|
|
|
return provided_signatures[aitr->second] = true;
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return provided_signatures[itr->second] = true;
|
|
|
|
|
}
|
|
|
|
|
|
2015-07-16 22:13:11 +00:00
|
|
|
bool check_authority( account_id_type id )
|
|
|
|
|
{
|
2015-07-17 04:41:43 +00:00
|
|
|
if( approved_by.find(id) != approved_by.end() ) return true;
|
2015-07-16 22:13:11 +00:00
|
|
|
return check_authority( get_active(id) );
|
2015-07-10 19:56:44 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
|
* Checks to see if we have signatures of the active authorites of
|
|
|
|
|
* the accounts specified in authority or the keys specified.
|
|
|
|
|
*/
|
2015-07-22 21:06:48 +00:00
|
|
|
bool check_authority( const authority* au, uint32_t depth = 0 )
|
2015-07-10 19:56:44 +00:00
|
|
|
{
|
|
|
|
|
if( au == nullptr ) return false;
|
|
|
|
|
const authority& auth = *au;
|
|
|
|
|
|
|
|
|
|
uint32_t total_weight = 0;
|
|
|
|
|
for( const auto& k : auth.key_auths )
|
|
|
|
|
if( signed_by( k.first ) )
|
|
|
|
|
{
|
|
|
|
|
total_weight += k.second;
|
|
|
|
|
if( total_weight >= auth.weight_threshold )
|
|
|
|
|
return true;
|
|
|
|
|
}
|
2015-09-24 14:10:36 +00:00
|
|
|
|
|
|
|
|
for( const auto& k : auth.address_auths )
|
|
|
|
|
if( signed_by( k.first ) )
|
|
|
|
|
{
|
|
|
|
|
total_weight += k.second;
|
|
|
|
|
if( total_weight >= auth.weight_threshold )
|
|
|
|
|
return true;
|
|
|
|
|
}
|
2015-07-10 19:56:44 +00:00
|
|
|
|
|
|
|
|
for( const auto& a : auth.account_auths )
|
|
|
|
|
{
|
|
|
|
|
if( approved_by.find(a.first) == approved_by.end() )
|
|
|
|
|
{
|
2015-07-17 04:41:43 +00:00
|
|
|
if( depth == max_recursion )
|
2016-03-20 00:21:13 +00:00
|
|
|
continue;
|
2015-07-10 19:56:44 +00:00
|
|
|
if( check_authority( get_active( a.first ), depth+1 ) )
|
|
|
|
|
{
|
|
|
|
|
approved_by.insert( a.first );
|
|
|
|
|
total_weight += a.second;
|
|
|
|
|
if( total_weight >= auth.weight_threshold )
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
{
|
|
|
|
|
total_weight += a.second;
|
|
|
|
|
if( total_weight >= auth.weight_threshold )
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return total_weight >= auth.weight_threshold;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
bool remove_unused_signatures()
|
|
|
|
|
{
|
|
|
|
|
vector<public_key_type> remove_sigs;
|
2015-07-16 22:13:11 +00:00
|
|
|
for( const auto& sig : provided_signatures )
|
|
|
|
|
if( !sig.second ) remove_sigs.push_back( sig.first );
|
|
|
|
|
|
2015-07-10 19:56:44 +00:00
|
|
|
for( auto& sig : remove_sigs )
|
2015-07-16 22:13:11 +00:00
|
|
|
provided_signatures.erase(sig);
|
|
|
|
|
|
2015-07-10 19:56:44 +00:00
|
|
|
return remove_sigs.size() != 0;
|
|
|
|
|
}
|
|
|
|
|
|
2015-07-16 22:13:11 +00:00
|
|
|
sign_state( const flat_set<public_key_type>& sigs,
|
|
|
|
|
const std::function<const authority*(account_id_type)>& a,
|
|
|
|
|
const flat_set<public_key_type>& keys = flat_set<public_key_type>() )
|
|
|
|
|
:get_active(a),available_keys(keys)
|
2015-07-10 19:56:44 +00:00
|
|
|
{
|
2015-07-16 22:13:11 +00:00
|
|
|
for( const auto& key : sigs )
|
|
|
|
|
provided_signatures[ key ] = false;
|
|
|
|
|
approved_by.insert( GRAPHENE_TEMP_ACCOUNT );
|
2015-07-10 19:56:44 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
const std::function<const authority*(account_id_type)>& get_active;
|
2015-07-16 22:13:11 +00:00
|
|
|
const flat_set<public_key_type>& available_keys;
|
2015-07-10 19:56:44 +00:00
|
|
|
|
2015-07-16 22:13:11 +00:00
|
|
|
flat_map<public_key_type,bool> provided_signatures;
|
|
|
|
|
flat_set<account_id_type> approved_by;
|
2015-07-17 04:41:43 +00:00
|
|
|
uint32_t max_recursion = GRAPHENE_MAX_SIG_CHECK_DEPTH;
|
2015-07-10 19:56:44 +00:00
|
|
|
};
|
|
|
|
|
|
2015-07-16 22:13:11 +00:00
|
|
|
|
|
|
|
|
void verify_authority( const vector<operation>& ops, const flat_set<public_key_type>& sigs,
|
|
|
|
|
const std::function<const authority*(account_id_type)>& get_active,
|
|
|
|
|
const std::function<const authority*(account_id_type)>& get_owner,
|
2015-07-17 04:41:43 +00:00
|
|
|
uint32_t max_recursion_depth,
|
|
|
|
|
bool allow_committe,
|
2015-07-16 22:13:11 +00:00
|
|
|
const flat_set<account_id_type>& active_aprovals,
|
|
|
|
|
const flat_set<account_id_type>& owner_approvals )
|
|
|
|
|
{ try {
|
2015-07-10 19:56:44 +00:00
|
|
|
flat_set<account_id_type> required_active;
|
|
|
|
|
flat_set<account_id_type> required_owner;
|
|
|
|
|
vector<authority> other;
|
|
|
|
|
|
2015-07-16 22:13:11 +00:00
|
|
|
for( const auto& op : ops )
|
|
|
|
|
operation_get_required_authorities( op, required_active, required_owner, other );
|
|
|
|
|
|
2015-07-17 04:41:43 +00:00
|
|
|
if( !allow_committe )
|
|
|
|
|
GRAPHENE_ASSERT( required_active.find(GRAPHENE_COMMITTEE_ACCOUNT) == required_active.end(),
|
|
|
|
|
invalid_committee_approval, "Committee account may only propose transactions" );
|
|
|
|
|
|
2015-07-16 22:13:11 +00:00
|
|
|
sign_state s(sigs,get_active);
|
2015-07-17 04:41:43 +00:00
|
|
|
s.max_recursion = max_recursion_depth;
|
2015-07-16 22:13:11 +00:00
|
|
|
for( auto& id : active_aprovals )
|
|
|
|
|
s.approved_by.insert( id );
|
|
|
|
|
for( auto& id : owner_approvals )
|
|
|
|
|
s.approved_by.insert( id );
|
2015-07-10 19:56:44 +00:00
|
|
|
|
|
|
|
|
for( const auto& auth : other )
|
2015-07-27 16:09:34 +00:00
|
|
|
{
|
2015-07-16 22:13:11 +00:00
|
|
|
GRAPHENE_ASSERT( s.check_authority(&auth), tx_missing_other_auth, "Missing Authority", ("auth",auth)("sigs",sigs) );
|
2015-07-27 16:09:34 +00:00
|
|
|
}
|
2015-07-16 22:13:11 +00:00
|
|
|
|
|
|
|
|
// fetch all of the top level authorities
|
2015-07-10 19:56:44 +00:00
|
|
|
for( auto id : required_active )
|
2015-07-27 16:09:34 +00:00
|
|
|
{
|
2015-07-16 22:13:11 +00:00
|
|
|
GRAPHENE_ASSERT( s.check_authority(id) ||
|
|
|
|
|
s.check_authority(get_owner(id)),
|
|
|
|
|
tx_missing_active_auth, "Missing Active Authority ${id}", ("id",id)("auth",*get_active(id))("owner",*get_owner(id)) );
|
2015-07-27 16:09:34 +00:00
|
|
|
}
|
2015-07-16 22:13:11 +00:00
|
|
|
|
2015-07-10 19:56:44 +00:00
|
|
|
for( auto id : required_owner )
|
2015-07-27 16:09:34 +00:00
|
|
|
{
|
2015-07-16 22:13:11 +00:00
|
|
|
GRAPHENE_ASSERT( owner_approvals.find(id) != owner_approvals.end() ||
|
|
|
|
|
s.check_authority(get_owner(id)),
|
2015-07-28 19:26:22 +00:00
|
|
|
tx_missing_owner_auth, "Missing Owner Authority ${id}", ("id",id)("auth",*get_owner(id)) );
|
2015-07-27 16:09:34 +00:00
|
|
|
}
|
2015-07-10 19:56:44 +00:00
|
|
|
|
2015-07-28 18:19:11 +00:00
|
|
|
GRAPHENE_ASSERT(
|
|
|
|
|
!s.remove_unused_signatures(),
|
|
|
|
|
tx_irrelevant_sig,
|
|
|
|
|
"Unnecessary signature(s) detected"
|
|
|
|
|
);
|
2015-07-16 22:13:11 +00:00
|
|
|
} FC_CAPTURE_AND_RETHROW( (ops)(sigs) ) }
|
2015-07-10 19:56:44 +00:00
|
|
|
|
2015-07-16 22:13:11 +00:00
|
|
|
|
2015-08-06 16:41:45 +00:00
|
|
|
flat_set<public_key_type> signed_transaction::get_signature_keys( const chain_id_type& chain_id )const
|
2015-07-16 22:13:11 +00:00
|
|
|
{ try {
|
2015-08-06 16:41:45 +00:00
|
|
|
auto d = sig_digest( chain_id );
|
2015-07-16 22:13:11 +00:00
|
|
|
flat_set<public_key_type> result;
|
|
|
|
|
for( const auto& sig : signatures )
|
2015-07-27 16:09:34 +00:00
|
|
|
{
|
2015-07-28 19:08:46 +00:00
|
|
|
GRAPHENE_ASSERT(
|
|
|
|
|
result.insert( fc::ecc::public_key(sig,d) ).second,
|
|
|
|
|
tx_duplicate_sig,
|
|
|
|
|
"Duplicate Signature detected" );
|
2015-07-27 16:09:34 +00:00
|
|
|
}
|
2015-07-16 22:13:11 +00:00
|
|
|
return result;
|
|
|
|
|
} FC_CAPTURE_AND_RETHROW() }
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2015-08-06 16:41:45 +00:00
|
|
|
set<public_key_type> signed_transaction::get_required_signatures(
|
|
|
|
|
const chain_id_type& chain_id,
|
|
|
|
|
const flat_set<public_key_type>& available_keys,
|
|
|
|
|
const std::function<const authority*(account_id_type)>& get_active,
|
|
|
|
|
const std::function<const authority*(account_id_type)>& get_owner,
|
|
|
|
|
uint32_t max_recursion_depth )const
|
2015-07-10 19:56:44 +00:00
|
|
|
{
|
|
|
|
|
flat_set<account_id_type> required_active;
|
|
|
|
|
flat_set<account_id_type> required_owner;
|
|
|
|
|
vector<authority> other;
|
|
|
|
|
get_required_authorities( required_active, required_owner, other );
|
|
|
|
|
|
2015-07-16 22:13:11 +00:00
|
|
|
|
2015-08-06 16:41:45 +00:00
|
|
|
sign_state s(get_signature_keys( chain_id ),get_active,available_keys);
|
2015-07-17 04:41:43 +00:00
|
|
|
s.max_recursion = max_recursion_depth;
|
2015-07-10 19:56:44 +00:00
|
|
|
|
|
|
|
|
for( const auto& auth : other )
|
2015-07-16 22:13:11 +00:00
|
|
|
s.check_authority(&auth);
|
|
|
|
|
for( auto& owner : required_owner )
|
|
|
|
|
s.check_authority( get_owner( owner ) );
|
|
|
|
|
for( auto& active : required_active )
|
|
|
|
|
s.check_authority( active );
|
2015-07-10 19:56:44 +00:00
|
|
|
|
2015-07-16 22:13:11 +00:00
|
|
|
s.remove_unused_signatures();
|
|
|
|
|
|
|
|
|
|
set<public_key_type> result;
|
|
|
|
|
|
|
|
|
|
for( auto& provided_sig : s.provided_signatures )
|
|
|
|
|
if( available_keys.find( provided_sig.first ) != available_keys.end() )
|
|
|
|
|
result.insert( provided_sig.first );
|
|
|
|
|
|
|
|
|
|
return result;
|
2015-07-10 19:56:44 +00:00
|
|
|
}
|
|
|
|
|
|
2015-07-22 20:21:26 +00:00
|
|
|
set<public_key_type> signed_transaction::minimize_required_signatures(
|
2015-08-06 16:41:45 +00:00
|
|
|
const chain_id_type& chain_id,
|
2015-07-22 20:21:26 +00:00
|
|
|
const flat_set<public_key_type>& available_keys,
|
|
|
|
|
const std::function<const authority*(account_id_type)>& get_active,
|
|
|
|
|
const std::function<const authority*(account_id_type)>& get_owner,
|
|
|
|
|
uint32_t max_recursion
|
|
|
|
|
) const
|
|
|
|
|
{
|
2015-08-06 16:41:45 +00:00
|
|
|
set< public_key_type > s = get_required_signatures( chain_id, available_keys, get_active, get_owner, max_recursion );
|
2015-07-22 20:21:26 +00:00
|
|
|
flat_set< public_key_type > result( s.begin(), s.end() );
|
|
|
|
|
|
|
|
|
|
for( const public_key_type& k : s )
|
|
|
|
|
{
|
|
|
|
|
result.erase( k );
|
|
|
|
|
try
|
|
|
|
|
{
|
|
|
|
|
graphene::chain::verify_authority( operations, result, get_active, get_owner, max_recursion );
|
|
|
|
|
continue; // element stays erased if verify_authority is ok
|
|
|
|
|
}
|
|
|
|
|
catch( const tx_missing_owner_auth& e ) {}
|
|
|
|
|
catch( const tx_missing_active_auth& e ) {}
|
|
|
|
|
catch( const tx_missing_other_auth& e ) {}
|
|
|
|
|
result.insert( k );
|
|
|
|
|
}
|
|
|
|
|
return set<public_key_type>( result.begin(), result.end() );
|
|
|
|
|
}
|
2015-07-16 22:13:11 +00:00
|
|
|
|
2015-08-06 16:41:45 +00:00
|
|
|
void signed_transaction::verify_authority(
|
|
|
|
|
const chain_id_type& chain_id,
|
|
|
|
|
const std::function<const authority*(account_id_type)>& get_active,
|
|
|
|
|
const std::function<const authority*(account_id_type)>& get_owner,
|
|
|
|
|
uint32_t max_recursion )const
|
2015-07-16 22:13:11 +00:00
|
|
|
{ try {
|
2015-08-06 16:41:45 +00:00
|
|
|
graphene::chain::verify_authority( operations, get_signature_keys( chain_id ), get_active, get_owner, max_recursion );
|
2015-07-16 22:13:11 +00:00
|
|
|
} FC_CAPTURE_AND_RETHROW( (*this) ) }
|
|
|
|
|
|
2015-06-08 15:50:35 +00:00
|
|
|
} } // graphene::chain
|