2015-06-08 15:50:35 +00:00
|
|
|
/*
|
2015-10-12 17:48:40 +00:00
|
|
|
* Copyright (c) 2015 Cryptonomex, Inc., and contributors.
|
|
|
|
|
*
|
2016-01-06 09:51:18 +00:00
|
|
|
* The MIT License
|
2015-10-12 17:48:40 +00:00
|
|
|
*
|
2016-01-06 09:51:18 +00:00
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
|
|
|
* of this software and associated documentation files (the "Software"), to deal
|
|
|
|
|
* in the Software without restriction, including without limitation the rights
|
|
|
|
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
|
|
|
* copies of the Software, and to permit persons to whom the Software is
|
|
|
|
|
* furnished to do so, subject to the following conditions:
|
2015-10-12 17:48:40 +00:00
|
|
|
*
|
2016-01-06 09:51:18 +00:00
|
|
|
* The above copyright notice and this permission notice shall be included in
|
|
|
|
|
* all copies or substantial portions of the Software.
|
2015-10-12 17:02:59 +00:00
|
|
|
*
|
2016-01-06 09:51:18 +00:00
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
|
|
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
|
|
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
|
|
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
|
|
|
|
* THE SOFTWARE.
|
2015-06-08 15:50:35 +00:00
|
|
|
*/
|
2018-09-05 14:43:35 +00:00
|
|
|
#include <graphene/chain/hardfork.hpp>
|
2015-06-08 15:50:35 +00:00
|
|
|
#include <graphene/chain/proposal_evaluator.hpp>
|
|
|
|
|
#include <graphene/chain/proposal_object.hpp>
|
|
|
|
|
#include <graphene/chain/account_object.hpp>
|
2019-10-23 16:46:04 +00:00
|
|
|
#include <graphene/chain/son_proposal_object.hpp>
|
2018-03-22 18:01:56 +00:00
|
|
|
#include <graphene/chain/protocol/account.hpp>
|
2015-07-08 20:39:23 +00:00
|
|
|
#include <graphene/chain/protocol/fee_schedule.hpp>
|
2018-03-23 13:17:22 +00:00
|
|
|
#include <graphene/chain/protocol/tournament.hpp>
|
2015-07-08 20:30:32 +00:00
|
|
|
#include <graphene/chain/exceptions.hpp>
|
2018-03-22 18:01:56 +00:00
|
|
|
#include <graphene/chain/hardfork.hpp>
|
2015-06-08 15:50:35 +00:00
|
|
|
|
2015-07-20 18:57:08 +00:00
|
|
|
#include <fc/smart_ref_impl.hpp>
|
|
|
|
|
|
2015-06-08 15:50:35 +00:00
|
|
|
namespace graphene { namespace chain {
|
|
|
|
|
|
2018-09-05 14:43:35 +00:00
|
|
|
struct proposal_operation_hardfork_visitor
|
|
|
|
|
{
|
|
|
|
|
typedef void result_type;
|
|
|
|
|
const fc::time_point_sec block_time;
|
|
|
|
|
|
|
|
|
|
proposal_operation_hardfork_visitor( const fc::time_point_sec bt ) : block_time(bt) {}
|
|
|
|
|
|
|
|
|
|
template<typename T>
|
|
|
|
|
void operator()(const T &v) const {}
|
|
|
|
|
|
2019-11-22 13:16:55 +00:00
|
|
|
void operator()(const committee_member_update_global_parameters_operation &op) const {}
|
2018-09-05 14:43:35 +00:00
|
|
|
|
2018-10-11 11:36:49 +00:00
|
|
|
void operator()(const graphene::chain::tournament_payout_operation &o) const {
|
|
|
|
|
// TODO: move check into tournament_payout_operation::validate after HARDFORK_999_TIME
|
|
|
|
|
FC_ASSERT( block_time < HARDFORK_999_TIME, "Not allowed!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const graphene::chain::asset_settle_cancel_operation &o) const {
|
|
|
|
|
// TODO: move check into asset_settle_cancel_operation::validate after HARDFORK_999_TIME
|
|
|
|
|
FC_ASSERT( block_time < HARDFORK_999_TIME, "Not allowed!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const graphene::chain::account_create_operation &aco) const {
|
|
|
|
|
// TODO: remove after HARDFORK_999_TIME
|
|
|
|
|
if (block_time < HARDFORK_999_TIME)
|
|
|
|
|
FC_ASSERT( !aco.extensions.value.affiliate_distributions.valid(), "Affiliate reward distributions not allowed yet" );
|
|
|
|
|
}
|
2018-09-10 19:03:28 +00:00
|
|
|
|
|
|
|
|
void operator()(const sport_update_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_1000_TIME, "sport_update_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const event_group_create_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_1000_TIME, "event_group_create_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const event_group_update_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_1000_TIME, "event_group_update_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const event_create_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_1000_TIME, "event_create_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const event_update_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_1000_TIME, "event_update_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const betting_market_rules_create_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_1000_TIME, "betting_market_rules_create_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const betting_market_rules_update_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_1000_TIME, "betting_market_rules_update_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const betting_market_group_create_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_1000_TIME, "betting_market_group_create_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const betting_market_create_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_1000_TIME, "betting_market_create_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const bet_place_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_1000_TIME, "bet_place_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const betting_market_group_resolve_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_1000_TIME, "betting_market_group_resolve_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const betting_market_group_cancel_unmatched_bets_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_1000_TIME, "betting_market_group_cancel_unmatched_bets_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const bet_cancel_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_1000_TIME, "betting_market_group_resolve_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const betting_market_group_update_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_1000_TIME, "betting_market_group_update_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const betting_market_update_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_1000_TIME, "betting_market_update_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const event_update_status_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_1000_TIME, "event_update_status_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
2019-10-17 16:39:44 +00:00
|
|
|
void operator()(const vesting_balance_create_operation &vbco) const {
|
|
|
|
|
if(block_time < HARDFORK_GPOS_TIME)
|
2020-09-22 16:56:19 +00:00
|
|
|
FC_ASSERT( vbco.balance_type == vesting_balance_type::normal, "balance_type in vesting create not allowed yet!" );
|
2019-10-17 16:39:44 +00:00
|
|
|
}
|
|
|
|
|
|
2020-08-10 13:18:47 +00:00
|
|
|
void operator()(const custom_permission_create_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "custom_permission_create_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const custom_permission_update_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "custom_permission_update_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const custom_permission_delete_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "custom_permission_delete_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const custom_account_authority_create_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "custom_account_authority_create_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const custom_account_authority_update_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "custom_account_authority_update_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const custom_account_authority_delete_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "custom_account_authority_delete_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const offer_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "offer_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const bid_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "bid_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const cancel_offer_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "cancel_offer_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const finalize_offer_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "finalize_offer_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const nft_metadata_create_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "nft_metadata_create_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const nft_metadata_update_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "nft_metadata_update_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const nft_mint_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "nft_mint_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const nft_safe_transfer_from_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "nft_safe_transfer_from_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const nft_approve_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "nft_approve_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const nft_set_approval_for_all_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "nft_set_approval_for_all_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
2020-09-02 03:16:07 +00:00
|
|
|
void operator()(const account_role_create_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "account_role_create_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const account_role_update_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "account_role_update_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const account_role_delete_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "account_role_delete_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
2020-09-23 17:13:34 +00:00
|
|
|
void operator()(const nft_lottery_token_purchase_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "nft_lottery_token_purchase_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const nft_lottery_reward_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "nft_lottery_reward_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const nft_lottery_end_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_NFT_TIME, "nft_lottery_end_operation not allowed yet!" );
|
|
|
|
|
}
|
2020-08-10 13:18:47 +00:00
|
|
|
|
2019-10-09 20:24:36 +00:00
|
|
|
void operator()(const son_create_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_SON_TIME, "son_create_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
void operator()(const son_update_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_SON_TIME, "son_update_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
2020-05-04 05:37:41 +00:00
|
|
|
void operator()(const son_deregister_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_SON_TIME, "son_deregister_operation not allowed yet!" );
|
2019-10-09 20:24:36 +00:00
|
|
|
}
|
|
|
|
|
|
2019-12-12 13:06:38 +00:00
|
|
|
void operator()(const son_heartbeat_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_SON_TIME, "son_heartbeat_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
2020-01-06 12:59:35 +00:00
|
|
|
void operator()(const son_report_down_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_SON_TIME, "son_report_down_operation not allowed yet!" );
|
|
|
|
|
}
|
|
|
|
|
|
2020-01-17 20:30:45 +00:00
|
|
|
void operator()(const son_maintenance_operation &v) const {
|
|
|
|
|
FC_ASSERT( block_time >= HARDFORK_SON_TIME, "son_maintenance_operation not allowed yet!" );
|
2020-03-05 20:20:24 +00:00
|
|
|
}
|
2020-03-03 20:42:51 +00:00
|
|
|
|
2018-09-05 14:43:35 +00:00
|
|
|
// loop and self visit in proposals
|
|
|
|
|
void operator()(const proposal_create_operation &v) const {
|
|
|
|
|
for (const op_wrapper &op : v.proposed_ops)
|
|
|
|
|
op.op.visit(*this);
|
|
|
|
|
}
|
|
|
|
|
};
|
|
|
|
|
|
2020-05-04 05:37:41 +00:00
|
|
|
void son_hardfork_visitor::operator()( const son_deregister_operation &v )
|
2019-10-23 16:46:04 +00:00
|
|
|
{
|
|
|
|
|
db.create<son_proposal_object>([&]( son_proposal_object& son_prop ) {
|
|
|
|
|
son_prop.proposal_type = son_proposal_type::son_deregister_proposal;
|
|
|
|
|
son_prop.proposal_id = prop_id;
|
|
|
|
|
son_prop.son_id = v.son_id;
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
|
2020-01-31 11:58:07 +00:00
|
|
|
void son_hardfork_visitor::operator()( const son_report_down_operation &v )
|
|
|
|
|
{
|
|
|
|
|
db.create<son_proposal_object>([&]( son_proposal_object& son_prop ) {
|
|
|
|
|
son_prop.proposal_type = son_proposal_type::son_report_down_proposal;
|
|
|
|
|
son_prop.proposal_id = prop_id;
|
|
|
|
|
son_prop.son_id = v.son_id;
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
|
2020-09-22 16:56:19 +00:00
|
|
|
void_result proposal_create_evaluator::do_evaluate( const proposal_create_operation& o )
|
2015-06-23 21:33:06 +00:00
|
|
|
{ try {
|
2015-06-08 15:50:35 +00:00
|
|
|
const database& d = db();
|
2020-09-08 12:35:29 +00:00
|
|
|
auto block_time = d.head_block_time();
|
2018-09-05 14:43:35 +00:00
|
|
|
|
2020-09-08 12:35:29 +00:00
|
|
|
proposal_operation_hardfork_visitor vtor( block_time );
|
2018-09-05 14:43:35 +00:00
|
|
|
vtor( o );
|
|
|
|
|
|
2015-06-08 15:50:35 +00:00
|
|
|
const auto& global_parameters = d.get_global_properties().parameters;
|
|
|
|
|
|
2020-09-08 12:35:29 +00:00
|
|
|
FC_ASSERT( o.expiration_time > block_time, "Proposal has already expired on creation." );
|
|
|
|
|
FC_ASSERT( o.expiration_time <= block_time + global_parameters.maximum_proposal_lifetime,
|
2015-06-08 15:50:35 +00:00
|
|
|
"Proposal expiration time is too far in the future.");
|
2020-09-08 12:35:29 +00:00
|
|
|
FC_ASSERT( !o.review_period_seconds || fc::seconds(*o.review_period_seconds) < (o.expiration_time - block_time),
|
2015-06-08 15:50:35 +00:00
|
|
|
"Proposal review period must be less than its overall lifetime." );
|
|
|
|
|
|
|
|
|
|
{
|
2015-07-13 19:19:36 +00:00
|
|
|
// If we're dealing with the committee authority, make sure this transaction has a sufficient review period.
|
2015-06-08 15:50:35 +00:00
|
|
|
flat_set<account_id_type> auths;
|
2015-07-08 20:39:23 +00:00
|
|
|
vector<authority> other;
|
2015-06-08 15:50:35 +00:00
|
|
|
for( auto& op : o.proposed_ops )
|
2015-07-07 14:57:01 +00:00
|
|
|
{
|
2020-09-08 12:35:29 +00:00
|
|
|
operation_get_required_authorities( op.op, auths, auths, other,
|
|
|
|
|
MUST_IGNORE_CUSTOM_OP_REQD_AUTHS(block_time) );
|
2015-07-07 14:57:01 +00:00
|
|
|
}
|
2015-07-08 20:39:23 +00:00
|
|
|
|
|
|
|
|
FC_ASSERT( other.size() == 0 ); // TODO: what about other???
|
|
|
|
|
|
2015-08-26 19:31:05 +00:00
|
|
|
if( auths.find(GRAPHENE_COMMITTEE_ACCOUNT) != auths.end() )
|
2015-07-08 20:30:32 +00:00
|
|
|
{
|
|
|
|
|
GRAPHENE_ASSERT(
|
|
|
|
|
o.review_period_seconds.valid(),
|
|
|
|
|
proposal_create_review_period_required,
|
|
|
|
|
"Review period not given, but at least ${min} required",
|
|
|
|
|
("min", global_parameters.committee_proposal_review_period)
|
|
|
|
|
);
|
|
|
|
|
GRAPHENE_ASSERT(
|
|
|
|
|
*o.review_period_seconds >= global_parameters.committee_proposal_review_period,
|
|
|
|
|
proposal_create_review_period_insufficient,
|
2015-09-17 15:23:55 +00:00
|
|
|
"Review period of ${t} specified, but at least ${min} required",
|
2015-07-08 20:30:32 +00:00
|
|
|
("t", *o.review_period_seconds)
|
|
|
|
|
("min", global_parameters.committee_proposal_review_period)
|
|
|
|
|
);
|
|
|
|
|
}
|
2015-06-08 15:50:35 +00:00
|
|
|
}
|
|
|
|
|
|
2020-09-08 12:35:29 +00:00
|
|
|
for (const op_wrapper& op : o.proposed_ops)
|
2015-06-08 15:50:35 +00:00
|
|
|
_proposed_trx.operations.push_back(op.op);
|
|
|
|
|
_proposed_trx.validate();
|
|
|
|
|
|
2015-06-23 21:33:06 +00:00
|
|
|
return void_result();
|
|
|
|
|
} FC_CAPTURE_AND_RETHROW( (o) ) }
|
2015-06-08 15:50:35 +00:00
|
|
|
|
2020-09-08 12:35:29 +00:00
|
|
|
object_id_type proposal_create_evaluator::do_apply( const proposal_create_operation& o )
|
2015-06-23 21:33:06 +00:00
|
|
|
{ try {
|
2015-06-08 15:50:35 +00:00
|
|
|
database& d = db();
|
2020-09-08 12:35:29 +00:00
|
|
|
auto chain_time = d.head_block_time();
|
2015-06-08 15:50:35 +00:00
|
|
|
|
2020-09-08 12:35:29 +00:00
|
|
|
const proposal_object& proposal = d.create<proposal_object>( [&o, this, chain_time](proposal_object& proposal) {
|
2015-07-14 22:46:58 +00:00
|
|
|
_proposed_trx.expiration = o.expiration_time;
|
2015-06-08 15:50:35 +00:00
|
|
|
proposal.proposed_transaction = _proposed_trx;
|
2018-01-29 13:19:38 +00:00
|
|
|
proposal.proposer = o.fee_paying_account;
|
2015-06-08 15:50:35 +00:00
|
|
|
proposal.expiration_time = o.expiration_time;
|
|
|
|
|
if( o.review_period_seconds )
|
|
|
|
|
proposal.review_period_time = o.expiration_time - *o.review_period_seconds;
|
|
|
|
|
|
|
|
|
|
//Populate the required approval sets
|
|
|
|
|
flat_set<account_id_type> required_active;
|
2015-07-08 20:39:23 +00:00
|
|
|
vector<authority> other;
|
|
|
|
|
|
|
|
|
|
// TODO: consider caching values from evaluate?
|
2015-07-07 14:57:01 +00:00
|
|
|
for( auto& op : _proposed_trx.operations )
|
2020-09-08 12:35:29 +00:00
|
|
|
operation_get_required_authorities( op, required_active, proposal.required_owner_approvals, other,
|
|
|
|
|
MUST_IGNORE_CUSTOM_OP_REQD_AUTHS(chain_time) );
|
2015-07-07 14:57:01 +00:00
|
|
|
|
2015-06-08 15:50:35 +00:00
|
|
|
//All accounts which must provide both owner and active authority should be omitted from the active authority set;
|
|
|
|
|
//owner authority approval implies active authority approval.
|
|
|
|
|
std::set_difference(required_active.begin(), required_active.end(),
|
|
|
|
|
proposal.required_owner_approvals.begin(), proposal.required_owner_approvals.end(),
|
|
|
|
|
std::inserter(proposal.required_active_approvals, proposal.required_active_approvals.begin()));
|
|
|
|
|
});
|
|
|
|
|
|
2019-10-23 16:46:04 +00:00
|
|
|
son_hardfork_visitor son_vtor(d, proposal.id);
|
|
|
|
|
for(auto& op: o.proposed_ops)
|
|
|
|
|
{
|
|
|
|
|
op.op.visit(son_vtor);
|
|
|
|
|
}
|
|
|
|
|
|
2015-06-08 15:50:35 +00:00
|
|
|
return proposal.id;
|
2015-06-23 21:33:06 +00:00
|
|
|
} FC_CAPTURE_AND_RETHROW( (o) ) }
|
2015-06-08 15:50:35 +00:00
|
|
|
|
2020-09-08 12:35:29 +00:00
|
|
|
void_result proposal_update_evaluator::do_evaluate( const proposal_update_operation& o )
|
2015-06-23 21:33:06 +00:00
|
|
|
{ try {
|
2015-06-08 15:50:35 +00:00
|
|
|
database& d = db();
|
|
|
|
|
|
|
|
|
|
_proposal = &o.proposal(d);
|
|
|
|
|
|
|
|
|
|
if( _proposal->review_period_time && d.head_block_time() >= *_proposal->review_period_time )
|
|
|
|
|
FC_ASSERT( o.active_approvals_to_add.empty() && o.owner_approvals_to_add.empty(),
|
|
|
|
|
"This proposal is in its review period. No new approvals may be added." );
|
|
|
|
|
|
|
|
|
|
for( account_id_type id : o.active_approvals_to_remove )
|
|
|
|
|
{
|
|
|
|
|
FC_ASSERT( _proposal->available_active_approvals.find(id) != _proposal->available_active_approvals.end(),
|
|
|
|
|
"", ("id", id)("available", _proposal->available_active_approvals) );
|
|
|
|
|
}
|
|
|
|
|
for( account_id_type id : o.owner_approvals_to_remove )
|
|
|
|
|
{
|
|
|
|
|
FC_ASSERT( _proposal->available_owner_approvals.find(id) != _proposal->available_owner_approvals.end(),
|
|
|
|
|
"", ("id", id)("available", _proposal->available_owner_approvals) );
|
|
|
|
|
}
|
2015-07-02 05:52:45 +00:00
|
|
|
|
2015-06-15 19:24:58 +00:00
|
|
|
return void_result();
|
2015-06-23 21:33:06 +00:00
|
|
|
} FC_CAPTURE_AND_RETHROW( (o) ) }
|
2015-06-08 15:50:35 +00:00
|
|
|
|
2015-06-15 19:24:58 +00:00
|
|
|
void_result proposal_update_evaluator::do_apply(const proposal_update_operation& o)
|
2015-06-23 21:33:06 +00:00
|
|
|
{ try {
|
2015-06-08 15:50:35 +00:00
|
|
|
database& d = db();
|
|
|
|
|
|
|
|
|
|
// Potential optimization: if _executed_proposal is true, we can skip the modify step and make push_proposal skip
|
|
|
|
|
// signature checks. This isn't done now because I just wrote all the proposals code, and I'm not yet 100% sure the
|
|
|
|
|
// required approvals are sufficient to authorize the transaction.
|
|
|
|
|
d.modify(*_proposal, [&o, &d](proposal_object& p) {
|
|
|
|
|
p.available_active_approvals.insert(o.active_approvals_to_add.begin(), o.active_approvals_to_add.end());
|
|
|
|
|
p.available_owner_approvals.insert(o.owner_approvals_to_add.begin(), o.owner_approvals_to_add.end());
|
|
|
|
|
for( account_id_type id : o.active_approvals_to_remove )
|
|
|
|
|
p.available_active_approvals.erase(id);
|
|
|
|
|
for( account_id_type id : o.owner_approvals_to_remove )
|
|
|
|
|
p.available_owner_approvals.erase(id);
|
2015-07-02 05:52:45 +00:00
|
|
|
for( const auto& id : o.key_approvals_to_add )
|
2015-06-08 15:50:35 +00:00
|
|
|
p.available_key_approvals.insert(id);
|
2015-07-02 05:52:45 +00:00
|
|
|
for( const auto& id : o.key_approvals_to_remove )
|
2015-06-08 15:50:35 +00:00
|
|
|
p.available_key_approvals.erase(id);
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
// If the proposal has a review period, don't bother attempting to authorize/execute it.
|
|
|
|
|
// Proposals with a review period may never be executed except at their expiration.
|
|
|
|
|
if( _proposal->review_period_time )
|
2015-06-15 19:24:58 +00:00
|
|
|
return void_result();
|
2015-06-08 15:50:35 +00:00
|
|
|
|
2015-06-29 21:29:04 +00:00
|
|
|
if( _proposal->is_authorized_to_execute(d) )
|
2015-06-08 15:50:35 +00:00
|
|
|
{
|
|
|
|
|
// All required approvals are satisfied. Execute!
|
|
|
|
|
_executed_proposal = true;
|
|
|
|
|
try {
|
|
|
|
|
_processed_transaction = d.push_proposal(*_proposal);
|
|
|
|
|
} catch(fc::exception& e) {
|
2018-06-12 14:49:20 +00:00
|
|
|
d.modify(*_proposal, [&e](proposal_object& p) {
|
|
|
|
|
p.fail_reason = e.to_string(fc::log_level(fc::log_level::all));
|
|
|
|
|
});
|
2015-06-08 15:50:35 +00:00
|
|
|
wlog("Proposed transaction ${id} failed to apply once approved with exception:\n----\n${reason}\n----\nWill try again when it expires.",
|
|
|
|
|
("id", o.proposal)("reason", e.to_detail_string()));
|
|
|
|
|
_proposal_failed = true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2015-06-15 19:24:58 +00:00
|
|
|
return void_result();
|
2015-06-23 21:33:06 +00:00
|
|
|
} FC_CAPTURE_AND_RETHROW( (o) ) }
|
2015-06-08 15:50:35 +00:00
|
|
|
|
2015-06-15 19:24:58 +00:00
|
|
|
void_result proposal_delete_evaluator::do_evaluate(const proposal_delete_operation& o)
|
2015-06-23 21:33:06 +00:00
|
|
|
{ try {
|
2015-06-08 15:50:35 +00:00
|
|
|
database& d = db();
|
|
|
|
|
|
|
|
|
|
_proposal = &o.proposal(d);
|
|
|
|
|
|
|
|
|
|
auto required_approvals = o.using_owner_authority? &_proposal->required_owner_approvals
|
|
|
|
|
: &_proposal->required_active_approvals;
|
|
|
|
|
FC_ASSERT( required_approvals->find(o.fee_paying_account) != required_approvals->end(),
|
|
|
|
|
"Provided authority is not authoritative for this proposal.",
|
|
|
|
|
("provided", o.fee_paying_account)("required", *required_approvals));
|
|
|
|
|
|
2015-06-15 19:24:58 +00:00
|
|
|
return void_result();
|
2015-06-23 21:33:06 +00:00
|
|
|
} FC_CAPTURE_AND_RETHROW( (o) ) }
|
2015-06-08 15:50:35 +00:00
|
|
|
|
2015-06-23 21:33:06 +00:00
|
|
|
void_result proposal_delete_evaluator::do_apply(const proposal_delete_operation& o)
|
|
|
|
|
{ try {
|
2015-06-08 15:50:35 +00:00
|
|
|
db().remove(*_proposal);
|
|
|
|
|
|
2015-06-15 19:24:58 +00:00
|
|
|
return void_result();
|
2015-06-23 21:33:06 +00:00
|
|
|
} FC_CAPTURE_AND_RETHROW( (o) ) }
|
2015-06-08 15:50:35 +00:00
|
|
|
|
|
|
|
|
} } // graphene::chain
|