1#include <xrpld/app/misc/DelegateUtils.h>
2#include <xrpld/app/tx/detail/MPTokenIssuanceSet.h>
4#include <xrpl/protocol/Feature.h>
5#include <xrpl/protocol/LedgerFormats.h>
6#include <xrpl/protocol/TxFlags.h>
51 auto const mutableFlags = ctx.
tx[~sfMutableFlags];
52 auto const metadata = ctx.
tx[~sfMPTokenMetadata];
53 auto const transferFee = ctx.
tx[~sfTransferFee];
54 auto const isMutate = mutableFlags || metadata || transferFee;
68 auto const accountID = ctx.
tx[sfAccount];
69 auto const holderID = ctx.
tx[~sfHolder];
70 if (holderID && accountID == holderID)
84 if (isMutate && holderID)
107 [mutableFlags](
auto const& f) {
108 return (*mutableFlags & f.setFlag) &&
109 (*mutableFlags & f.clearFlag);
115 if (transferFee.value_or(0) &&
127 auto const delegate = tx[~sfDelegate];
132 auto const sle =
view.
read(delegateKey);
151 !granularPermissions.
contains(MPTokenIssuanceLock))
155 !granularPermissions.
contains(MPTokenIssuanceUnlock))
165 auto const sleMptIssuance =
181 if ((*sleMptIssuance)[sfIssuer] != ctx.
tx[sfAccount])
184 if (
auto const holderID = ctx.
tx[~sfHolder])
196 if (
auto const domain = ctx.
tx[~sfDomainID])
201 if (*domain != beast::zero)
203 auto const sleDomain =
212 auto const currentMutableFlags =
213 sleMptIssuance->getFieldU32(sfMutableFlags);
215 auto isMutableFlag = [&](
std::uint32_t mutableFlag) ->
bool {
216 return currentMutableFlags & mutableFlag;
219 if (
auto const mutableFlags = ctx.
tx[~sfMutableFlags])
224 [mutableFlags, &isMutableFlag](
auto const& f) {
225 return !isMutableFlag(f.canMutateFlag) &&
226 ((*mutableFlags & (f.setFlag | f.clearFlag)));
235 if (
auto const fee = ctx.
tx[~sfTransferFee])
254 auto const mptIssuanceID =
ctx_.
tx[sfMPTokenIssuanceID];
256 auto const holderID =
ctx_.
tx[~sfHolder];
257 auto const domainID =
ctx_.
tx[~sfDomainID];
274 flagsOut &= ~lsfMPTLocked;
276 if (
auto const mutableFlags =
ctx_.
tx[~sfMutableFlags].value_or(0))
280 if (mutableFlags & f.setFlag)
281 flagsOut |= f.canMutateFlag;
282 else if (mutableFlags & f.clearFlag)
283 flagsOut &= ~f.canMutateFlag;
290 sle->makeFieldAbsent(sfTransferFee);
294 if (flagsIn != flagsOut)
295 sle->setFieldU32(sfFlags, flagsOut);
297 if (
auto const transferFee =
ctx_.
tx[~sfTransferFee])
303 if (transferFee == 0)
304 sle->makeFieldAbsent(sfTransferFee);
306 sle->setFieldU16(sfTransferFee, *transferFee);
309 if (
auto const metadata =
ctx_.
tx[~sfMPTokenMetadata])
311 if (metadata->empty())
312 sle->makeFieldAbsent(sfMPTokenMetadata);
314 sle->setFieldVL(sfMPTokenMetadata, *metadata);
321 sle->getType() == ltMPTOKEN_ISSUANCE,
322 "MPTokenIssuanceSet::doApply : modifying MPTokenIssuance");
324 if (*domainID != beast::zero)
326 sle->setFieldH256(sfDomainID, *domainID);
330 if (sle->isFieldPresent(sfDomainID))
331 sle->makeFieldAbsent(sfDomainID);
virtual void update(std::shared_ptr< SLE > const &sle)=0
Indicate changes to a peeked SLE.
virtual std::shared_ptr< SLE > peek(Keylet const &k)=0
Prepare to modify the SLE associated with key.
static TER preclaim(PreclaimContext const &ctx)
static NotTEC preflight(PreflightContext const &ctx)
static std::uint32_t getFlagsMask(PreflightContext const &ctx)
static bool checkExtraFeatures(PreflightContext const &ctx)
static NotTEC checkPermission(ReadView const &view, STTx const &tx)
virtual std::shared_ptr< SLE const > read(Keylet const &k) const =0
Return the state item associated with a key.
virtual bool exists(Keylet const &k) const =0
Determine if a state item exists.
virtual Rules const & rules() const =0
Returns the tx processing rules.
bool enabled(uint256 const &feature) const
Returns true if a feature is enabled.
bool isFlag(std::uint32_t) const
bool isFieldPresent(SField const &field) const
std::uint32_t getFlags() const
Keylet mptoken(MPTID const &issuanceID, AccountID const &holder) noexcept
Keylet delegate(AccountID const &account, AccountID const &authorizedAccount) noexcept
A keylet for Delegate object.
Keylet permissionedDomain(AccountID const &account, std::uint32_t seq) noexcept
Keylet mptIssuance(std::uint32_t seq, AccountID const &issuer) noexcept
Keylet account(AccountID const &id) noexcept
AccountID root.
Use hash_* containers for keys that do not need a cryptographically secure hashing algorithm.
constexpr std::uint32_t const tfMPTokenIssuanceSetMask
NotTEC checkTxPermission(std::shared_ptr< SLE const > const &delegate, STTx const &tx)
Check if the delegate account has permission to execute the transaction.
constexpr std::uint32_t const tfMPTokenIssuanceSetPermissionMask
constexpr std::uint32_t const tmfMPTClearCanClawback
constexpr std::uint32_t const tmfMPTokenIssuanceSetMutableMask
constexpr std::uint32_t const tmfMPTClearCanEscrow
constexpr std::uint32_t const tmfMPTSetCanClawback
constexpr std::uint32_t const tmfMPTSetRequireAuth
constexpr std::uint32_t const tmfMPTClearCanTrade
constexpr std::uint32_t const tfMPTUnlock
@ lsmfMPTCanMutateRequireAuth
@ lsmfMPTCanMutateCanTransfer
@ lsmfMPTCanMutateCanTrade
@ lsmfMPTCanMutateCanEscrow
@ lsmfMPTCanMutateCanClawback
@ lsmfMPTCanMutateMetadata
@ lsmfMPTCanMutateCanLock
@ lsmfMPTCanMutateTransferFee
constexpr std::uint32_t const tmfMPTClearRequireAuth
std::uint16_t constexpr maxTransferFee
The maximum token transfer fee allowed.
constexpr std::uint32_t const tmfMPTSetCanLock
constexpr std::uint32_t const tmfMPTSetCanTrade
std::size_t constexpr maxMPTokenMetadataLength
The maximum length of MPTokenMetadata.
void loadGranularPermission(std::shared_ptr< SLE const > const &delegate, TxType const &type, std::unordered_set< GranularPermissionType > &granularPermissions)
Load the granular permissions granted to the delegate account for the specified transaction type.
constexpr std::uint32_t const tmfMPTSetCanEscrow
constexpr std::uint32_t const tmfMPTClearCanLock
constexpr std::uint32_t const tmfMPTSetCanTransfer
constexpr std::uint32_t const tfMPTLock
constexpr std::uint32_t tfUniversalMask
@ terNO_DELEGATE_PERMISSION
constexpr std::uint32_t const tmfMPTClearCanTransfer
static constexpr std::array< MPTMutabilityFlags, 6 > mptMutabilityFlags
TERSubset< CanCvtToNotTEC > NotTEC
std::uint32_t canMutateFlag
State information when determining if a tx is likely to claim a fee.
State information when preflighting a tx.