20#include <xrpld/app/misc/DelegateUtils.h>
21#include <xrpld/app/tx/detail/MPTokenIssuanceSet.h>
23#include <xrpl/protocol/Feature.h>
24#include <xrpl/protocol/LedgerFormats.h>
25#include <xrpl/protocol/TxFlags.h>
58 auto const mutableFlags = ctx.
tx[~sfMutableFlags];
59 auto const metadata = ctx.
tx[~sfMPTokenMetadata];
60 auto const transferFee = ctx.
tx[~sfTransferFee];
61 auto const isMutate = mutableFlags || metadata || transferFee;
81 auto const accountID = ctx.
tx[sfAccount];
82 auto const holderID = ctx.
tx[~sfHolder];
83 if (holderID && accountID == holderID)
97 if (isMutate && holderID)
112 if (!*mutableFlags ||
120 [mutableFlags](
auto const& f) {
121 return (*mutableFlags & f.setFlag) &&
122 (*mutableFlags & f.clearFlag);
128 if (transferFee.value_or(0) &&
140 auto const delegate = tx[~sfDelegate];
145 auto const sle =
view.
read(delegateKey);
164 !granularPermissions.
contains(MPTokenIssuanceLock))
168 !granularPermissions.
contains(MPTokenIssuanceUnlock))
178 auto const sleMptIssuance =
194 if ((*sleMptIssuance)[sfIssuer] != ctx.
tx[sfAccount])
197 if (
auto const holderID = ctx.
tx[~sfHolder])
209 if (
auto const domain = ctx.
tx[~sfDomainID])
214 if (*domain != beast::zero)
216 auto const sleDomain =
225 auto const currentMutableFlags =
226 sleMptIssuance->getFieldU32(sfMutableFlags);
228 auto isMutableFlag = [&](
std::uint32_t mutableFlag) ->
bool {
229 return currentMutableFlags & mutableFlag;
232 if (
auto const mutableFlags = ctx.
tx[~sfMutableFlags])
237 [mutableFlags, &isMutableFlag](
auto const& f) {
238 return !isMutableFlag(f.canMutateFlag) &&
239 ((*mutableFlags & (f.setFlag | f.clearFlag)));
248 if (
auto const fee = ctx.
tx[~sfTransferFee])
267 auto const mptIssuanceID =
ctx_.
tx[sfMPTokenIssuanceID];
269 auto const holderID =
ctx_.
tx[~sfHolder];
270 auto const domainID =
ctx_.
tx[~sfDomainID];
287 flagsOut &= ~lsfMPTLocked;
289 if (
auto const mutableFlags =
ctx_.
tx[~sfMutableFlags].value_or(0))
293 if (mutableFlags & f.setFlag)
294 flagsOut |= f.canMutateFlag;
295 else if (mutableFlags & f.clearFlag)
296 flagsOut &= ~f.canMutateFlag;
303 sle->makeFieldAbsent(sfTransferFee);
307 if (flagsIn != flagsOut)
308 sle->setFieldU32(sfFlags, flagsOut);
310 if (
auto const transferFee =
ctx_.
tx[~sfTransferFee])
316 if (transferFee == 0)
317 sle->makeFieldAbsent(sfTransferFee);
319 sle->setFieldU16(sfTransferFee, *transferFee);
322 if (
auto const metadata =
ctx_.
tx[~sfMPTokenMetadata])
324 if (metadata->empty())
325 sle->makeFieldAbsent(sfMPTokenMetadata);
327 sle->setFieldVL(sfMPTokenMetadata, *metadata);
334 sle->getType() == ltMPTOKEN_ISSUANCE,
335 "MPTokenIssuanceSet::doApply : modifying MPTokenIssuance");
337 if (*domainID != beast::zero)
339 sle->setFieldH256(sfDomainID, *domainID);
343 if (sle->isFieldPresent(sfDomainID))
344 sle->makeFieldAbsent(sfDomainID);
virtual void update(std::shared_ptr< SLE > const &sle)=0
Indicate changes to a peeked SLE.
virtual std::shared_ptr< SLE > peek(Keylet const &k)=0
Prepare to modify the SLE associated with key.
static TER preclaim(PreclaimContext const &ctx)
static NotTEC preflight(PreflightContext const &ctx)
static TER checkPermission(ReadView const &view, STTx const &tx)
virtual std::shared_ptr< SLE const > read(Keylet const &k) const =0
Return the state item associated with a key.
virtual bool exists(Keylet const &k) const =0
Determine if a state item exists.
virtual Rules const & rules() const =0
Returns the tx processing rules.
bool enabled(uint256 const &feature) const
Returns true if a feature is enabled.
bool isFlag(std::uint32_t) const
bool isFieldPresent(SField const &field) const
std::uint32_t getFlags() const
Keylet mptoken(MPTID const &issuanceID, AccountID const &holder) noexcept
Keylet delegate(AccountID const &account, AccountID const &authorizedAccount) noexcept
A keylet for Delegate object.
Keylet permissionedDomain(AccountID const &account, std::uint32_t seq) noexcept
Keylet mptIssuance(std::uint32_t seq, AccountID const &issuer) noexcept
Keylet account(AccountID const &id) noexcept
AccountID root.
Use hash_* containers for keys that do not need a cryptographically secure hashing algorithm.
constexpr std::uint32_t const tfMPTokenIssuanceSetMask
constexpr std::uint32_t const tfMPTokenIssuanceSetPermissionMask
constexpr std::uint32_t const tfMPTClearCanLock
constexpr std::uint32_t const tfMPTClearCanEscrow
constexpr std::uint32_t const tfMPTSetRequireAuth
constexpr std::uint32_t const tfMPTClearCanTransfer
constexpr std::uint32_t const tfMPTUnlock
constexpr std::uint32_t const tfMPTClearCanTrade
@ lsfMPTCanMutateMetadata
@ lsfMPTCanMutateCanClawback
@ lsfMPTCanMutateCanTransfer
@ lsfMPTCanMutateCanEscrow
@ lsfMPTCanMutateCanTrade
@ lsfMPTCanMutateRequireAuth
@ lsfMPTCanMutateTransferFee
std::uint16_t constexpr maxTransferFee
The maximum token transfer fee allowed.
NotTEC preflight1(PreflightContext const &ctx)
Performs early sanity checks on the account and fee fields.
constexpr std::uint32_t const tfMPTSetCanTransfer
constexpr std::uint32_t const tfMPTSetCanEscrow
std::size_t constexpr maxMPTokenMetadataLength
The maximum length of MPTokenMetadata.
constexpr std::uint32_t const tfMPTSetCanTrade
void loadGranularPermission(std::shared_ptr< SLE const > const &delegate, TxType const &type, std::unordered_set< GranularPermissionType > &granularPermissions)
Load the granular permissions granted to the delegate account for the specified transaction type.
NotTEC preflight2(PreflightContext const &ctx)
Checks whether the signature appears valid.
constexpr std::uint32_t const tfMPTSetCanClawback
constexpr std::uint32_t const tfMPTClearCanClawback
TER checkTxPermission(std::shared_ptr< SLE const > const &delegate, STTx const &tx)
Check if the delegate account has permission to execute the transaction.
@ tecNO_DELEGATE_PERMISSION
constexpr std::uint32_t const tfMPTLock
bool isTesSuccess(TER x) noexcept
constexpr std::uint32_t const tfMPTokenIssuanceSetMutableMask
constexpr std::uint32_t tfUniversalMask
constexpr std::uint32_t const tfMPTSetCanLock
constexpr std::uint32_t const tfMPTClearRequireAuth
static constexpr std::array< MPTMutabilityFlags, 6 > mptMutabilityFlags
TERSubset< CanCvtToNotTEC > NotTEC
std::uint32_t canMutateFlag
State information when determining if a tx is likely to claim a fee.
State information when preflighting a tx.