From 8e61dd691fd0f8701bc43ba0a9bf12e79a6d005f Mon Sep 17 00:00:00 2001 From: bthomee Date: Thu, 23 Jan 2025 22:00:45 +0000 Subject: [PATCH] deploy: 3868c04e99ef7c16e6b5f08002011cecc7ed35a8 --- PermissionedDomainDelete_8cpp_source.html | 73 +++++++++++--------- PermissionedDomainDelete_8h_source.html | 2 +- classripple_1_1PermissionedDomainDelete.html | 2 +- 3 files changed, 41 insertions(+), 36 deletions(-) diff --git a/PermissionedDomainDelete_8cpp_source.html b/PermissionedDomainDelete_8cpp_source.html index 2d6efbf614..1b86a0fe24 100644 --- a/PermissionedDomainDelete_8cpp_source.html +++ b/PermissionedDomainDelete_8cpp_source.html @@ -132,46 +132,51 @@ $(function() {
54 if (!sleDomain)
55 return tecNO_ENTRY;
56
-
57 assert(
-
58 sleDomain->isFieldPresent(sfOwner) && ctx.tx.isFieldPresent(sfAccount));
-
59 if (sleDomain->getAccountID(sfOwner) != ctx.tx.getAccountID(sfAccount))
-
60 return tecNO_PERMISSION;
-
61
-
62 return tesSUCCESS;
-
63}
-
64
-
66TER
-
67PermissionedDomainDelete::doApply()
-
68{
-
69 assert(ctx_.tx.isFieldPresent(sfDomainID));
-
70
-
71 auto const slePd =
-
72 view().peek({ltPERMISSIONED_DOMAIN, ctx_.tx.at(sfDomainID)});
-
73 auto const page = (*slePd)[sfOwnerNode];
-
74
-
75 if (!view().dirRemove(keylet::ownerDir(account_), page, slePd->key(), true))
-
76 {
-
77 JLOG(j_.fatal()) // LCOV_EXCL_LINE
-
78 << "Unable to delete permissioned domain directory entry."; // LCOV_EXCL_LINE
-
79 return tefBAD_LEDGER; // LCOV_EXCL_LINE
-
80 }
-
81
-
82 auto const ownerSle = view().peek(keylet::account(account_));
-
83 assert(ownerSle && ownerSle->getFieldU32(sfOwnerCount) > 0);
-
84 adjustOwnerCount(view(), ownerSle, -1, ctx_.journal);
-
85 view().erase(slePd);
-
86
-
87 return tesSUCCESS;
-
88}
-
89
-
90} // namespace ripple
+
57 XRPL_ASSERT(
+
58 sleDomain->isFieldPresent(sfOwner) && ctx.tx.isFieldPresent(sfAccount),
+
59 "ripple::PermissionedDomainDelete::preclaim : required fields present");
+
60 if (sleDomain->getAccountID(sfOwner) != ctx.tx.getAccountID(sfAccount))
+
61 return tecNO_PERMISSION;
+
62
+
63 return tesSUCCESS;
+
64}
+
65
+
67TER
+
68PermissionedDomainDelete::doApply()
+
69{
+
70 XRPL_ASSERT(
+
71 ctx_.tx.isFieldPresent(sfDomainID),
+
72 "ripple::PermissionedDomainDelete::doApply : required field present");
+
73
+
74 auto const slePd =
+
75 view().peek({ltPERMISSIONED_DOMAIN, ctx_.tx.at(sfDomainID)});
+
76 auto const page = (*slePd)[sfOwnerNode];
+
77
+
78 if (!view().dirRemove(keylet::ownerDir(account_), page, slePd->key(), true))
+
79 {
+
80 JLOG(j_.fatal()) // LCOV_EXCL_LINE
+
81 << "Unable to delete permissioned domain directory entry."; // LCOV_EXCL_LINE
+
82 return tefBAD_LEDGER; // LCOV_EXCL_LINE
+
83 }
+
84
+
85 auto const ownerSle = view().peek(keylet::account(account_));
+
86 XRPL_ASSERT(
+
87 ownerSle && ownerSle->getFieldU32(sfOwnerCount) > 0,
+
88 "ripple::PermissionedDomainDelete::doApply : nonzero owner count");
+
89 adjustOwnerCount(view(), ownerSle, -1, ctx_.journal);
+
90 view().erase(slePd);
+
91
+
92 return tesSUCCESS;
+
93}
+
94
+
95} // namespace ripple
Stream fatal() const
Definition: Journal.h:341
Stream debug() const
Definition: Journal.h:317
beast::Journal const journal
Definition: ApplyContext.h:51
STTx const & tx
Definition: ApplyContext.h:48
virtual std::shared_ptr< SLE > peek(Keylet const &k)=0
Prepare to modify the SLE associated with key.
virtual void erase(std::shared_ptr< SLE > const &sle)=0
Remove a peeked SLE.
-
TER doApply() override
Attempt to delete the Permissioned Domain.
+
TER doApply() override
Attempt to delete the Permissioned Domain.
static TER preclaim(PreclaimContext const &ctx)
static NotTEC preflight(PreflightContext const &ctx)
virtual std::shared_ptr< SLE const > read(Keylet const &k) const =0
Return the state item associated with a key.
diff --git a/PermissionedDomainDelete_8h_source.html b/PermissionedDomainDelete_8h_source.html index 936f08952f..8b332f6439 100644 --- a/PermissionedDomainDelete_8h_source.html +++ b/PermissionedDomainDelete_8h_source.html @@ -123,7 +123,7 @@ $(function() {
46} // namespace ripple
State information when applying a tx.
Definition: ApplyContext.h:36
-
TER doApply() override
Attempt to delete the Permissioned Domain.
+
TER doApply() override
Attempt to delete the Permissioned Domain.
PermissionedDomainDelete(ApplyContext &ctx)
static TER preclaim(PreclaimContext const &ctx)
static constexpr ConsequencesFactoryType ConsequencesFactory
diff --git a/classripple_1_1PermissionedDomainDelete.html b/classripple_1_1PermissionedDomainDelete.html index 3bfede7227..640b83f4e6 100644 --- a/classripple_1_1PermissionedDomainDelete.html +++ b/classripple_1_1PermissionedDomainDelete.html @@ -394,7 +394,7 @@ Static Private Member Functions

Implements ripple::Transactor.

-

Definition at line 67 of file PermissionedDomainDelete.cpp.

+

Definition at line 68 of file PermissionedDomainDelete.cpp.