peerplays_migrated/libraries/chain/transaction_evaluation_state.cpp

101 lines
4.3 KiB
C++
Raw Normal View History

2015-06-08 15:50:35 +00:00
/*
* Copyright (c) 2015, Cryptonomex, Inc.
* All rights reserved.
*
* This source code is provided for evaluation in private test networks only, until September 8, 2015. After this date, this license expires and
* the code may not be used, modified or distributed for any purpose. Redistribution and use in source and binary forms, with or without modification,
* are permitted until September 8, 2015, provided that the following conditions are met:
*
* 1. The code and/or derivative works are used only for private test networks consisting of no more than 10 P2P nodes.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
* THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
* ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include <graphene/chain/transaction_evaluation_state.hpp>
#include <graphene/chain/account_object.hpp>
#include <graphene/chain/asset_object.hpp>
#include <graphene/chain/delegate_object.hpp>
#include <graphene/chain/database.hpp>
#include <graphene/chain/exceptions.hpp>
namespace graphene { namespace chain {
bool transaction_evaluation_state::check_authority( const account_object& account, authority::classification auth_class, int depth )
{
2015-06-16 18:43:52 +00:00
if( (!_is_proposed_trx) && (_db->get_node_properties().skip_flags & database::skip_authority_check) )
return true;
2015-06-18 19:26:00 +00:00
if( account.get_id() == GRAPHENE_TEMP_ACCOUNT ||
2015-06-18 19:02:42 +00:00
approved_by.find(make_pair(account.id, auth_class)) != approved_by.end() )
2015-06-08 15:50:35 +00:00
return true;
FC_ASSERT( account.id.instance() != 0 || _is_proposed_trx );
const authority* au = nullptr;
switch( auth_class )
{
case authority::owner:
au = &account.owner;
break;
case authority::active:
au = &account.active;
break;
default:
FC_ASSERT( false, "Invalid Account Auth Class" );
};
uint32_t total_weight = 0;
for( const auto& auth : au->auths )
{
if( approved_by.find( std::make_pair(auth.first,auth_class) ) != approved_by.end() )
total_weight += auth.second;
else
{
const object& auth_item = _db->get_object( auth.first );
switch( auth_item.id.type() )
{
case account_object_type:
{
if( depth == GRAPHENE_MAX_SIG_CHECK_DEPTH )
{
//elog("Failing authority verification due to recursion depth.");
2015-06-08 15:50:35 +00:00
return false;
}
if( check_authority( *dynamic_cast<const account_object*>( &auth_item ), auth_class, depth + 1 ) )
{
approved_by.insert( std::make_pair(auth_item.id,auth_class) );
total_weight += auth.second;
}
break;
}
case key_object_type:
{
if( signed_by( auth.first ) )
{
approved_by.insert( std::make_pair(auth_item.id,authority::key) );
total_weight += auth.second;
}
break;
}
default:
FC_ASSERT( !"Invalid Auth Object Type", "type:${type}", ("type",auth_item.id.type()) );
}
}
if( total_weight >= au->weight_threshold )
{
approved_by.insert( std::make_pair(account.id, auth_class) );
return true;
}
}
return false;
}
bool transaction_evaluation_state::signed_by( key_id_type id )const
{
assert(_trx);
return _trx->signatures.find(id) != _trx->signatures.end();
}
} } // namespace graphene::chain