#include "TransactionEngine.h" #include #include "../json/writer.h" #include "Config.h" #include "TransactionFormats.h" #include "utils.h" #include "Log.h" #define DIR_NODE_MAX 32 // We return the uNodeDir so that on delete we can quickly know where the element is mentioned in the directory. TransactionEngineResult TransactionEngine::dirAdd( std::vector& accounts, uint64& uNodeDir, const uint256& uBase, const uint256& uLedgerIndex) { // Get the root. uint256 uRootIndex = Ledger::getDirIndex(uBase, 0); LedgerStateParms lspRoot = lepNONE; SLE::pointer sleRoot = mLedger->getDirRoot(lspRoot, uRootIndex); bool bRootNew; // Get the last node index. if (sleRoot) { bRootNew = false; uNodeDir = sleRoot->getIFieldU64(sfLastNode); } else { bRootNew = true; uNodeDir = 1; sleRoot = boost::make_shared(ltDIR_ROOT); sleRoot->setIndex(uRootIndex); std::cerr << "dirAdd: Creating dir index: " << sleRoot->getIndex().ToString() << std::endl; sleRoot->setIFieldU64(sfFirstNode, uNodeDir); sleRoot->setIFieldU64(sfLastNode, uNodeDir); std::cerr << "dirAdd: first & last: " << strHex(uNodeDir) << std::endl; accounts.push_back(std::make_pair(taaCREATE, sleRoot)); } // Get the last node. uint256 uNodeIndex = Ledger::getDirIndex(uBase, uNodeDir); LedgerStateParms lspNode = lepNONE; SLE::pointer sleNode = bRootNew ? SLE::pointer() : mLedger->getDirNode(lspNode, uNodeIndex); if (sleNode) { STVector256 svIndexes; svIndexes = sleNode->getIFieldV256(sfIndexes); if (DIR_NODE_MAX != svIndexes.peekValue().size()) { // Last node is not full, append. std::cerr << "dirAdd: appending: PREV: " << svIndexes.peekValue()[0].ToString() << std::endl; std::cerr << "dirAdd: appending: Node: " << strHex(uNodeDir) << std::endl; std::cerr << "dirAdd: appending: Entry: " << uLedgerIndex.ToString() << std::endl; svIndexes.peekValue().push_back(uLedgerIndex); sleNode->setIFieldV256(sfIndexes, svIndexes); accounts.push_back(std::make_pair(taaMODIFY, sleNode)); } // Last node is full, add a new node. else if (!++uNodeDir) { return terDIR_FULL; } else { // Record new last node. sleNode = SLE::pointer(); std::cerr << "dirAdd: last: " << strHex(uNodeDir) << std::endl; sleRoot->setIFieldU64(sfLastNode, uNodeDir); accounts.push_back(std::make_pair(taaMODIFY, sleRoot)); } } if (!sleNode) { // Add to last node, which is empty. sleNode = boost::make_shared(ltDIR_NODE); sleNode->setIndex(uNodeIndex); std::cerr << "dirAdd: Creating dir node: " << sleNode->getIndex().ToString() << std::endl; STVector256 svIndexes; svIndexes.peekValue().push_back(uLedgerIndex); sleNode->setIFieldV256(sfIndexes, svIndexes); accounts.push_back(std::make_pair(taaCREATE, sleNode)); } return terSUCCESS; } TransactionEngineResult TransactionEngine::dirDelete( std::vector& accounts, const uint64& uNodeDir, const uint256& uBase, const uint256& uLedgerIndex) { uint64 uNodeCur = uNodeDir; uint256 uNodeIndex = Ledger::getDirIndex(uBase, uNodeCur); LedgerStateParms lspNode = lepNONE; SLE::pointer sleNode = mLedger->getDirNode(lspNode, uNodeIndex); if (!sleNode) { std::cerr << "dirDelete: no such node" << std::endl; return terNODE_NOT_FOUND; } else { STVector256 svIndexes = sleNode->getIFieldV256(sfIndexes); std::vector& vuiIndexes = svIndexes.peekValue(); std::vector::iterator it; it = std::find(vuiIndexes.begin(), vuiIndexes.end(), uLedgerIndex); if (vuiIndexes.end() == it) { std::cerr << "dirDelete: node not mentioned" << std::endl; return terNODE_NOT_MENTIONED; } else { // Get root information LedgerStateParms lspRoot = lepNONE; SLE::pointer sleRoot = mLedger->getDirRoot(lspRoot, Ledger::getDirIndex(uBase, 0)); if (!sleRoot) { std::cerr << "dirDelete: root node is missing" << std::endl; return terNODE_NO_ROOT; } uint64 uFirstNodeOrig = sleRoot->getIFieldU64(sfFirstNode); uint64 uLastNodeOrig = sleRoot->getIFieldU64(sfLastNode); uint64 uFirstNode = uFirstNodeOrig; uint64 uLastNode = uLastNodeOrig; // Remove the element. if (vuiIndexes.size() > 1) { *it = vuiIndexes[vuiIndexes.size()-1]; } vuiIndexes.resize(vuiIndexes.size()-1); sleNode->setIFieldV256(sfIndexes, svIndexes); if (!vuiIndexes.empty() || (uFirstNode != uNodeCur && uLastNode != uNodeCur)) { // Node is not being deleted. accounts.push_back(std::make_pair(taaMODIFY, sleNode)); } while (uFirstNode && svIndexes.peekValue().empty() && (uFirstNode == uNodeCur || uLastNode == uNodeCur)) { // Current node is empty and first or last, delete it. accounts.push_back(std::make_pair(taaDELETE, sleNode)); if (uFirstNode == uLastNode) { // Complete deletion. uFirstNode = 0; } else { if (uFirstNode == uNodeCur) { // Advance first node ++uNodeCur; ++uFirstNode; } else { // Rewind last node --uNodeCur; --uLastNode; } // Get replacement node. lspNode = lepNONE; sleNode = mLedger->getDirNode(lspNode, Ledger::getDirIndex(uBase, uNodeCur)); svIndexes = sleNode->getIFieldV256(sfIndexes); } } if (uFirstNode == uFirstNodeOrig && uLastNode == uLastNodeOrig) { // Dir is fine. nothing(); } else if (uFirstNode) { // Update root's pointer pointers. sleRoot->setIFieldU64(sfFirstNode, uFirstNode); sleRoot->setIFieldU64(sfLastNode, uLastNode); accounts.push_back(std::make_pair(taaMODIFY, sleRoot)); } else { // Delete the root. accounts.push_back(std::make_pair(taaDELETE, sleRoot)); } } return terSUCCESS; } } // Set the authorized public ket for an account. May also set the generator map. TransactionEngineResult TransactionEngine::setAuthorized(const SerializedTransaction& txn, std::vector& accounts, bool bMustSetGenerator) { // // Verify that submitter knows the private key for the generator. // Otherwise, people could deny access to generators. // std::vector vucCipher = txn.getITFieldVL(sfGenerator); std::vector vucPubKey = txn.getITFieldVL(sfPubKey); std::vector vucSignature = txn.getITFieldVL(sfSignature); NewcoinAddress naAccountPublic = NewcoinAddress::createAccountPublic(vucPubKey); if (!naAccountPublic.accountPublicVerify(Serializer::getSHA512Half(vucCipher), vucSignature)) { std::cerr << "createGenerator: bad signature unauthorized generator claim" << std::endl; return tenBAD_GEN_AUTH; } // Create generator. uint160 hGeneratorID = naAccountPublic.getAccountID(); LedgerStateParms qry = lepNONE; SLE::pointer sleGen = mLedger->getGenerator(qry, hGeneratorID); if (!sleGen) { std::cerr << "createGenerator: creating generator" << std::endl; // Create the generator. sleGen = boost::make_shared(ltGENERATOR_MAP); sleGen->setIndex(Ledger::getGeneratorIndex(hGeneratorID)); // sleGen->setIFieldH160(sfGeneratorID, hGeneratorID); sleGen->setIFieldVL(sfGenerator, vucCipher); accounts.push_back(std::make_pair(taaCREATE, sleGen)); } else if (bMustSetGenerator) { // Doing a claim. Must set generator. // Generator is already in use. Regular passphrases limited to one wallet. std::cerr << "createGenerator: generator already in use" << std::endl; return tenGEN_IN_USE; } // Set the public key needed to use the account. SLE::pointer sleDst = accounts[0].second; uint160 uAuthKeyID = bMustSetGenerator ? hGeneratorID // Claim : txn.getITFieldAccount(sfAuthorizedKey); // PasswordSet sleDst->setIFieldAccount(sfAuthorizedKey, uAuthKeyID); return terSUCCESS; } TransactionEngineResult TransactionEngine::applyTransaction(const SerializedTransaction& txn, TransactionEngineParams params, uint32 targetLedger) { std::cerr << "applyTransaction>" << std::endl; mLedger = mDefaultLedger; assert(mLedger); if (mAlternateLedger && (targetLedger != 0) && (targetLedger != mLedger->getLedgerSeq()) && (targetLedger == mAlternateLedger->getLedgerSeq())) { Log(lsINFO) << "Transaction goes into wobble ledger"; mLedger = mAlternateLedger; } #ifdef DEBUG if (1) { Serializer ser; txn.add(ser); SerializerIterator sit(ser); SerializedTransaction s2(sit); if (!s2.isEquivalent(txn)) { std::cerr << "Transaction serdes mismatch" << std::endl; Json::StyledStreamWriter ssw; ssw.write(Log(lsINFO).ref(), txn.getJson(0)); ssw.write(Log(lsFATAL).ref(), s2.getJson(0)); assert(false); } } #endif TransactionEngineResult result = terSUCCESS; uint256 txID = txn.getTransactionID(); if (!txID) { std::cerr << "applyTransaction: invalid transaction id" << std::endl; result = tenINVALID; } // // Verify transaction is signed properly. // // Extract signing key // Transactions contain a signing key. This allows us to trivially verify a transaction has at least been properly signed // without going to disk. Each transaction also notes a source account id. This is used to verify that the signing key is // associated with the account. // XXX This could be a lot cleaner to prevent unnecessary copying. NewcoinAddress naSigningPubKey; if (terSUCCESS == result) naSigningPubKey = NewcoinAddress::createAccountPublic(txn.peekSigningPubKey()); // Consistency: really signed. if (terSUCCESS == result && !txn.checkSign(naSigningPubKey)) { std::cerr << "applyTransaction: Invalid transaction: bad signature" << std::endl; result = tenINVALID; } STAmount saCost = theConfig.FEE_DEFAULT; // Customize behavoir based on transaction type. if (terSUCCESS == result) { switch (txn.getTxnType()) { case ttCLAIM: case ttPASSWORD_SET: saCost = 0; break; case ttPAYMENT: if (txn.getFlags() & tfCreateAccount) { saCost = theConfig.FEE_ACCOUNT_CREATE; } break; case ttNICKNAME_SET: { LedgerStateParms qry = lepNONE; SLE::pointer sleNickname = mLedger->getNickname(qry, txn.getITFieldH256(sfNickname)); if (!sleNickname) saCost = theConfig.FEE_NICKNAME_CREATE; } break; case ttACCOUNT_SET: case ttCREDIT_SET: case ttINVOICE: case ttOFFER: case ttPASSWORD_FUND: case ttTRANSIT_SET: case ttWALLET_ADD: nothing(); break; case ttINVALID: std::cerr << "applyTransaction: Invalid transaction: ttINVALID transaction type" << std::endl; result = tenINVALID; break; default: std::cerr << "applyTransaction: Invalid transaction: unknown transaction type" << std::endl; result = tenUNKNOWN; break; } } STAmount saPaid = txn.getTransactionFee(); if (terSUCCESS == result && (params & tepNO_CHECK_FEE) == tepNONE) { if (!saCost.isZero()) { if (saPaid < saCost) { std::cerr << "applyTransaction: insufficient fee" << std::endl; result = tenINSUF_FEE_P; } } else { if (!saPaid.isZero()) { // Transaction is malformed. std::cerr << "applyTransaction: fee not allowed" << std::endl; result = tenINSUF_FEE_P; } } } // Get source account ID. uint160 srcAccountID = txn.getSourceAccount().getAccountID(); if (terSUCCESS == result && !srcAccountID) { std::cerr << "applyTransaction: bad source id" << std::endl; result = tenINVALID; } if (terSUCCESS != result) { // Avoid unnecessary locking. mLedger = Ledger::pointer(); return result; } boost::recursive_mutex::scoped_lock sl(mLedger->mLock); // find source account // If are only forwarding, due to resource limitations, we might verifying only some transactions, this would be probablistic. STAmount saSrcBalance; uint32 t_seq = txn.getSequence(); LedgerStateParms lspRoot = lepNONE; SLE::pointer sleSrc = mLedger->getAccountRoot(lspRoot, srcAccountID); if (!sleSrc) { std::cerr << str(boost::format("applyTransaction: Delay transaction: source account does not exisit: %s") % txn.getSourceAccount().humanAccountID()) << std::endl; result = terNO_ACCOUNT; } else { saSrcBalance = sleSrc->getIValueFieldAmount(sfBalance); } // Check if account cliamed. if (terSUCCESS == result) { switch (txn.getTxnType()) { case ttCLAIM: if (sleSrc->getIFieldPresent(sfAuthorizedKey)) { std::cerr << "applyTransaction: Account already claimed." << std::endl; result = tenCLAIMED; } break; default: if (!sleSrc->getIFieldPresent(sfAuthorizedKey)) { std::cerr << "applyTransaction: Source is an unclaimed account." << std::endl; result = terUNCLAIMED; } break; } } // Consistency: Check signature if (terSUCCESS == result) { switch (txn.getTxnType()) { case ttCLAIM: // Transaction's signing public key must be for the source account. // To prove the master private key made this transaction. if (naSigningPubKey.getAccountID() != srcAccountID) { // Signing Pub Key must be for Source Account ID. std::cerr << "sourceAccountID: " << naSigningPubKey.humanAccountID() << std::endl; std::cerr << "txn accountID: " << txn.getSourceAccount().humanAccountID() << std::endl; result = tenBAD_CLAIM_ID; } break; case ttPASSWORD_SET: // Transaction's signing public key must be for the source account. // To prove the master private key made this transaction. if (naSigningPubKey.getAccountID() != srcAccountID) { // Signing Pub Key must be for Source Account ID. std::cerr << "sourceAccountID: " << naSigningPubKey.humanAccountID() << std::endl; std::cerr << "txn accountID: " << txn.getSourceAccount().humanAccountID() << std::endl; result = tenBAD_SET_ID; } break; default: // Verify the transaction's signing public key is the key authorized for signing. if (naSigningPubKey.getAccountID() != sleSrc->getIValueFieldAccount(sfAuthorizedKey).getAccountID()) { std::cerr << "applyTransaction: Delay: Not authorized to use account." << std::endl; result = terBAD_AUTH; } break; } } // deduct the fee, so it's not available during the transaction // we only write the account back if the transaction succeeds if (terSUCCESS != result || saCost.isZero()) { nothing(); } else if (saSrcBalance < saPaid) { std::cerr << str(boost::format("applyTransaction: Delay transaction: insufficent balance: balance=%s paid=%s") % saSrcBalance.getText() % saPaid.getText()) << std::endl; result = terINSUF_FEE_B; } else { sleSrc->setIFieldAmount(sfBalance, saSrcBalance - saPaid); } // Validate sequence if (terSUCCESS != result) { nothing(); } else if (!saCost.isZero()) { uint32 a_seq = sleSrc->getIFieldU32(sfSequence); Log(lsINFO) << "Aseq=" << a_seq << ", Tseq=" << t_seq; if (t_seq != a_seq) { if (a_seq < t_seq) { std::cerr << "applyTransaction: future sequence number" << std::endl; result = terPRE_SEQ; } else if (mLedger->hasTransaction(txID)) { std::cerr << "applyTransaction: duplicate sequence number" << std::endl; result = terALREADY; } else { std::cerr << "applyTransaction: past sequence number" << std::endl; result = terPAST_SEQ; } } else { sleSrc->setIFieldU32(sfSequence, t_seq + 1); } } else { Log(lsINFO) << "Zero cost transaction"; if (t_seq) { std::cerr << "applyTransaction: bad sequence for pre-paid transaction" << std::endl; result = terPAST_SEQ; } } std::vector accounts; if (terSUCCESS == result) { accounts.push_back(std::make_pair(taaMODIFY, sleSrc)); switch(txn.getTxnType()) { case ttACCOUNT_SET: result = doAccountSet(txn, accounts); break; case ttCLAIM: result = doClaim(txn, accounts); break; case ttCREDIT_SET: result = doCreditSet(txn, accounts, srcAccountID); break; case ttINVALID: std::cerr << "applyTransaction: invalid type" << std::endl; result = tenINVALID; break; case ttINVOICE: result = doInvoice(txn, accounts); break; case ttOFFER: result = doOffer(txn, accounts); break; case ttNICKNAME_SET: result = doNicknameSet(txn, accounts, srcAccountID); break; case ttPASSWORD_FUND: result = doPasswordFund(txn, accounts, srcAccountID); break; case ttPASSWORD_SET: result = doPasswordSet(txn, accounts); break; case ttPAYMENT: result = doPayment(txn, accounts, srcAccountID); break; case ttTRANSIT_SET: result = doTransitSet(txn, accounts); break; case ttWALLET_ADD: result = doWalletAdd(txn, accounts); break; default: result = tenUNKNOWN; break; } } if (terSUCCESS == result) { // Write back the account states and add the transaction to the ledger for (std::vector::iterator it = accounts.begin(), end = accounts.end(); it != end; ++it) { if (it->first == taaCREATE) { std::cerr << "applyTransaction: taaCREATE: " << it->second->getText() << std::endl; if (mLedger->writeBack(lepCREATE, it->second) & lepERROR) assert(false); } else if (it->first == taaMODIFY) { std::cerr << "applyTransaction: taaMODIFY: " << it->second->getText() << std::endl; if (mLedger->writeBack(lepNONE, it->second) & lepERROR) assert(false); } else if (it->first == taaDELETE) { std::cerr << "applyTransaction: taaDELETE: " << it->second->getText() << std::endl; if (!mLedger->peekAccountStateMap()->delItem(it->second->getIndex())) assert(false); } } Serializer s; txn.add(s); if (!mLedger->addTransaction(txID, s)) assert(false); if ((params & tepUPDATE_TOTAL) != tepNONE) mLedger->destroyCoins(saPaid.getNValue()); } mLedger = Ledger::pointer(); return result; } TransactionEngineResult TransactionEngine::doAccountSet(const SerializedTransaction& txn, std::vector& accounts) { std::cerr << "doAccountSet>" << std::endl; SLE::pointer sleSrc = accounts[0].second; uint32 txFlags = txn.getFlags(); // // EmailHash // if (txFlags & tfUnsetEmailHash) { std::cerr << "doAccountSet: unset email hash" << std::endl; sleSrc->makeIFieldAbsent(sfEmailHash); } else if (txn.getITFieldPresent(sfEmailHash)) { std::cerr << "doAccountSet: set email hash" << std::endl; sleSrc->setIFieldH128(sfEmailHash, txn.getITFieldH128(sfEmailHash)); } // // WalletLocator // if (txFlags & tfUnsetWalletLocator) { std::cerr << "doAccountSet: unset wallet locator" << std::endl; sleSrc->makeIFieldAbsent(sfWalletLocator); } else if (txn.getITFieldPresent(sfWalletLocator)) { std::cerr << "doAccountSet: set wallet locator" << std::endl; sleSrc->setIFieldH256(sfWalletLocator, txn.getITFieldH256(sfWalletLocator)); } // // MessageKey // if (!txn.getITFieldPresent(sfMessageKey)) { nothing(); } else if (sleSrc->getIFieldPresent(sfMessageKey)) { std::cerr << "doAccountSet: can not change message key" << std::endl; return tenMSG_SET; } else { std::cerr << "doAccountSet: set message key" << std::endl; sleSrc->setIFieldVL(sfMessageKey, txn.getITFieldVL(sfMessageKey)); } std::cerr << "doAccountSet<" << std::endl; return terSUCCESS; } TransactionEngineResult TransactionEngine::doClaim(const SerializedTransaction& txn, std::vector& accounts) { std::cerr << "doClaim>" << std::endl; TransactionEngineResult result = setAuthorized(txn, accounts, true); std::cerr << "doClaim<" << std::endl; return result; } TransactionEngineResult TransactionEngine::doCreditSet(const SerializedTransaction& txn, std::vector&accounts, const uint160& uSrcAccountID) { TransactionEngineResult terResult = terSUCCESS; std::cerr << "doCreditSet>" << std::endl; // Check if destination makes sense. uint160 uDstAccountID = txn.getITFieldAccount(sfDestination); if (!uDstAccountID) { std::cerr << "doCreditSet: Invalid transaction: Payment destination account not specifed." << std::endl; return tenDST_NEEDED; } // XXX Might make sense for ripple. else if (uSrcAccountID == uDstAccountID) { std::cerr << "doCreditSet: Invalid transaction: Source account is the same as destination." << std::endl; return tenDST_IS_SRC; } LedgerStateParms qry = lepNONE; SLE::pointer sleDst = mLedger->getAccountRoot(qry, uDstAccountID); if (!sleDst) { std::cerr << "doCreditSet: Delay transaction: Destination account does not exist." << std::endl; return terNO_DST; } STAmount saLimitAmount = txn.getITFieldAmount(sfLimitAmount); uint160 uCurrency = saLimitAmount.getCurrency(); bool bSltD = uSrcAccountID < uDstAccountID; uint32 uFlags = bSltD ? lsfLowIndexed : lsfHighIndexed; STAmount saBalance(uCurrency); bool bAddIndex; qry = lepNONE; SLE::pointer sleRippleState = mLedger->getRippleState(qry, uSrcAccountID, uDstAccountID, uCurrency); if (sleRippleState) { bAddIndex = !(sleRippleState->getFlags() & uFlags); std::cerr << "doCreditSet: Modifying ripple line: bAddIndex=" << bAddIndex << std::endl; sleRippleState->setIFieldAmount(bSltD ? sfLowLimit : sfHighLimit, saLimitAmount); if (bAddIndex) sleRippleState->setFlag(uFlags); accounts.push_back(std::make_pair(taaMODIFY, sleRippleState)); } // Line does not exist. else if (saLimitAmount.isZero()) { std::cerr << "doCreditSet: Setting non-existant ripple line to 0." << std::endl; return terNO_LINE_NO_ZERO; } else { STAmount saZero(uCurrency); bAddIndex = true; sleRippleState = boost::make_shared(ltRIPPLE_STATE); sleRippleState->setIndex(Ledger::getRippleStateIndex(uSrcAccountID, uDstAccountID, uCurrency)); std::cerr << "doCreditSet: Creating ripple line: " << sleRippleState->getIndex().ToString() << std::endl; sleRippleState->setFlag(uFlags); sleRippleState->setIFieldAmount(sfBalance, saZero); // Zero balance in currency. sleRippleState->setIFieldAmount(bSltD ? sfLowLimit : sfHighLimit, saLimitAmount); sleRippleState->setIFieldAmount(bSltD ? sfHighLimit : sfLowLimit, saZero); sleRippleState->setIFieldAccount(bSltD ? sfLowID : sfHighID, uSrcAccountID); sleRippleState->setIFieldAccount(bSltD ? sfHighID : sfLowID, uDstAccountID); accounts.push_back(std::make_pair(taaCREATE, sleRippleState)); } if (bAddIndex) { // Add entries so clients can find lines. // - Client needs to be able to walk who account has given credit to and who has account's credit. // - Client doesn't need to know every account who has extended credit but it owed nothing. uint64 uSrcRef; // Ignored, ripple_state dirs never delete. // XXX Verify extend is passing the right bits, not the zero bits. // XXX Make dirAdd more flexiable to take vector. terResult = dirAdd(accounts, uSrcRef, Ledger::getRippleDirIndex(uSrcAccountID), sleRippleState->getIndex()); } std::cerr << "doCreditSet<" << std::endl; return terResult; } TransactionEngineResult TransactionEngine::doNicknameSet(const SerializedTransaction& txn, std::vector& accounts, const uint160& uSrcAccountID) { std::cerr << "doNicknameSet>" << std::endl; SLE::pointer sleSrc = accounts[0].second; uint256 uNickname = txn.getITFieldH256(sfNickname); bool bMinOffer = txn.getITFieldPresent(sfMinimumOffer); STAmount saMinOffer = bMinOffer ? txn.getITFieldAmount(sfAmount) : STAmount(); LedgerStateParms qry = lepNONE; SLE::pointer sleNickname = mLedger->getNickname(qry, uNickname); if (sleNickname) { // Edit old entry. sleNickname->setIFieldAccount(sfAccount, uSrcAccountID); if (bMinOffer && !saMinOffer.isZero()) { sleNickname->setIFieldAmount(sfMinimumOffer, saMinOffer); } else { sleNickname->makeIFieldAbsent(sfMinimumOffer); } accounts.push_back(std::make_pair(taaMODIFY, sleNickname)); } else { // Make a new entry. // XXX Need to include authorization limiting. sleNickname = boost::make_shared(ltNICKNAME); sleNickname->setIndex(Ledger::getNicknameIndex(uNickname)); std::cerr << "doNicknameSet: Creating nickname node: " << sleNickname->getIndex().ToString() << std::endl; sleNickname->setIFieldAccount(sfAccount, uSrcAccountID); if (bMinOffer && !saMinOffer.isZero()) sleNickname->setIFieldAmount(sfMinimumOffer, saMinOffer); // sleNickname->setIFieldH256(sfNickname, uNickname); accounts.push_back(std::make_pair(taaCREATE, sleNickname)); } std::cerr << "doNicknameSet<" << std::endl; return terSUCCESS; } TransactionEngineResult TransactionEngine::doPasswordFund(const SerializedTransaction& txn, std::vector& accounts, const uint160& uSrcAccountID) { std::cerr << "doPasswordFund>" << std::endl; uint160 uDstAccountID = txn.getITFieldAccount(sfDestination); LedgerStateParms qry = lepNONE; SLE::pointer sleSrc = accounts[0].second; SLE::pointer sleDst = uSrcAccountID == uDstAccountID ? sleSrc : mLedger->getAccountRoot(qry, uDstAccountID); if (!sleDst) { // Destination account does not exist. std::cerr << "doPasswordFund: Delay transaction: Destination account does not exist." << std::endl; return terSET_MISSING_DST; } if (sleDst->getFlags() & lsfPasswordSpent) { sleDst->clearFlag(lsfPasswordSpent); std::cerr << "doPasswordFund: Clearing spent." << sleDst->getFlags() << std::endl; if (uSrcAccountID != uDstAccountID) { std::cerr << "doPasswordFund: Destination modified." << std::endl; accounts.push_back(std::make_pair(taaMODIFY, sleDst)); } } std::cerr << "doPasswordFund<" << std::endl; return terSUCCESS; } TransactionEngineResult TransactionEngine::doPasswordSet(const SerializedTransaction& txn, std::vector& accounts) { std::cerr << "doPasswordSet>" << std::endl; SLE::pointer sleSrc = accounts[0].second; if (sleSrc->getFlags() & lsfPasswordSpent) { std::cerr << "doPasswordSet: Delay transaction: Funds already spent." << std::endl; return terFUNDS_SPENT; } sleSrc->setFlag(lsfPasswordSpent); TransactionEngineResult result = setAuthorized(txn, accounts, false); std::cerr << "doPasswordSet<" << std::endl; return result; } TransactionEngineResult TransactionEngine::doPayment(const SerializedTransaction& txn, std::vector& accounts, const uint160& srcAccountID) { uint32 txFlags = txn.getFlags(); uint160 uDstAccountID = txn.getITFieldAccount(sfDestination); if (!uDstAccountID) { std::cerr << "doPayment: Invalid transaction: Payment destination account not specifed." << std::endl; return tenINVALID; } // XXX Only bad if no currency conversion in between through other people's offer. else if (srcAccountID == uDstAccountID) { std::cerr << "doPayment: Invalid transaction: Source account is the same as destination." << std::endl; return tenINVALID; } bool bCreate = !!(txFlags & tfCreateAccount); uint160 uCurrency; if (txn.getITFieldPresent(sfCurrency)) { uCurrency = txn.getITFieldH160(sfCurrency); if (!uCurrency) { std::cerr << "doPayment: Invalid transaction: " SYSTEM_CURRENCY_CODE " explicitly specified." << std::endl; return tenEXPLICITXNC; } } LedgerStateParms qry = lepNONE; SLE::pointer sleDst = mLedger->getAccountRoot(qry, uDstAccountID); if (!sleDst) { // Destination account does not exist. if (bCreate && !!uCurrency) { std::cerr << "doPayment: Invalid transaction: Create account may only fund XBC." << std::endl; return tenCREATEXNC; } else if (!bCreate) { std::cerr << "doPayment: Delay transaction: Destination account does not exist." << std::endl; return terNO_DST; } // Create the account. sleDst = boost::make_shared(ltACCOUNT_ROOT); sleDst->setIndex(Ledger::getAccountRootIndex(uDstAccountID)); sleDst->setIFieldAccount(sfAccount, uDstAccountID); sleDst->setIFieldU32(sfSequence, 1); accounts.push_back(std::make_pair(taaCREATE, sleDst)); } // Destination exists. else if (bCreate) { std::cerr << "doPayment: Invalid transaction: Account already created." << std::endl; return terCREATED; } else { accounts.push_back(std::make_pair(taaMODIFY, sleDst)); } STAmount saAmount = txn.getITFieldAmount(sfAmount); if (!uCurrency) { STAmount saSrcBalance = accounts[0].second->getIValueFieldAmount(sfBalance); if (saSrcBalance < saAmount) { std::cerr << "doPayment: Delay transaction: Insufficent funds." << std::endl; return terUNFUNDED; } accounts[0].second->setIFieldAmount(sfBalance, saSrcBalance - saAmount); accounts[1].second->setIFieldAmount(sfBalance, accounts[1].second->getIValueFieldAmount(sfBalance) + saAmount); } else { // WRITEME: Handle non-native currencies, paths return tenUNKNOWN; } return terSUCCESS; } TransactionEngineResult TransactionEngine::doTransitSet(const SerializedTransaction& st, std::vector&) { std::cerr << "doTransitSet>" << std::endl; #if 0 SLE::pointer sleSrc = accounts[0].second; bool bTxnTransitRate = st->getIFieldPresent(sfTransitRate); bool bTxnTransitStart = st->getIFieldPresent(sfTransitStart); bool bTxnTransitExpire = st->getIFieldPresent(sfTransitExpire); uint32 uTxnTransitRate = bTxnTransitRate ? st->getIFieldU32(sfTransitRate) : 0; uint32 uTxnTransitStart = bTxnTransitStart ? st->getIFieldU32(sfTransitStart) : 0; uint32 uTxnTransitExpire = bTxnTransitExpire ? st->getIFieldU32(sfTransitExpire) : 0; bool bActTransitRate = sleSrc->getIFieldPresent(sfTransitRate); bool bActTransitExpire = sleSrc->getIFieldPresent(sfTransitExpire); bool bActNextTransitRate = sleSrc->getIFieldPresent(sfNextTransitRate); bool bActNextTransitStart = sleSrc->getIFieldPresent(sfNextTransitStart); bool bActNextTransitExpire = sleSrc->getIFieldPresent(sfNextTransitExpire); uint32 uActTransitRate = bActTransitRate ? sleSrc->getIFieldU32(sfTransitRate) : 0; uint32 uActTransitExpire = bActTransitExpire ? sleSrc->getIFieldU32(sfTransitExpire) : 0; uint32 uActNextTransitRate = bActNextTransitRate ? sleSrc->getIFieldU32(sfNextTransitRate) : 0; uint32 uActNextTransitStart = bActNextTransitStart ? sleSrc->getIFieldU32(sfNextTransitStart) : 0; uint32 uActNextTransitExpire = bActNextTransitExpire ? sleSrc->getIFieldU32(sfNextTransitExpire) : 0; // // Update view // bool bNoCurrent = !bActTransitRate; bool bCurrentExpired = bActTransitExpire // Current can expire && bActNextTransitStart // Have a replacement && uActTransitExpire <= uLedger; // Current is expired // Replace current with next if need. if (bNoCurrent // No current. && bActNextTransitRate // Have next. && uActNextTransitStart <= uLedger) // Next has started. { // Make next current. uActTransitRate = uActNextTransitRate; bActTransitExpire = bActNextTransitStart; uActTransitExpire = uActNextTransitExpire; // Remove next. uActNextTransitStart = 0; } // // Determine new transaction deposition. // bool bBetterThanCurrent = !no current || ( Expires same or later than current Start before or same as current Fee same or less than current ) bool bBetterThanNext = !no next || ( Expires same or later than next Start before or same as next Fee same or less than next ) bool bBetterThanBoth = bBetterThanCurrent && bBetterThanNext bool bCurrentBlocks = !bBetterThanCurrent && overlaps with current bool bNextBlocks = !bBetterThanNext && overlaps with next if (bBetterThanBoth) { // Erase both and install. // If not starting now, install as next. } else if (bCurrentBlocks || bNextBlocks) { // Invalid ignore } else if (bBetterThanCurrent) { // Install over current } else if (bBetterThanNext) { // Install over next } else { // Error. } return tenTRANSIT_WORSE; // Set current. uDstTransitRate = uTxnTransitRate; uDstTransitExpire = uTxnTransitExpire; // 0 for never expire. // Set future. uDstNextTransitRate = uTxnTransitRate; uDstNextTransitStart = uTxnTransitStart; uDstNextTransitExpire = uTxnTransitExpire; // 0 for never expire. if (txn.getITFieldPresent(sfCurrency)) #endif std::cerr << "doTransitSet<" << std::endl; return tenINVALID; } TransactionEngineResult TransactionEngine::doWalletAdd(const SerializedTransaction& txn, std::vector& accounts) { std::cerr << "WalletAdd>" << std::endl; std::vector vucPubKey = txn.getITFieldVL(sfPubKey); std::vector vucSignature = txn.getITFieldVL(sfSignature); uint160 uAuthKeyID = txn.getITFieldAccount(sfAuthorizedKey); NewcoinAddress naMasterPubKey = NewcoinAddress::createAccountPublic(vucPubKey); uint160 uDstAccountID = naMasterPubKey.getAccountID(); if (!naMasterPubKey.accountPublicVerify(Serializer::getSHA512Half(uAuthKeyID.begin(), uAuthKeyID.size()), vucSignature)) { std::cerr << "WalletAdd: unauthorized: bad signature " << std::endl; return tenBAD_ADD_AUTH; } LedgerStateParms qry = lepNONE; SLE::pointer sleDst = mLedger->getAccountRoot(qry, uDstAccountID); if (sleDst) { std::cerr << "WalletAdd: account already created" << std::endl; return tenCREATED; } SLE::pointer sleSrc = accounts[0].second; STAmount saAmount = txn.getITFieldAmount(sfAmount); STAmount saSrcBalance = sleSrc->getIValueFieldAmount(sfBalance); if (saSrcBalance < saAmount) { std::cerr << str(boost::format("WalletAdd: Delay transaction: insufficent balance: balance=%s amount=%s") % saSrcBalance.getText() % saAmount.getText()) << std::endl; return terUNFUNDED; } // Deduct initial balance from source account. sleSrc->setIFieldAmount(sfBalance, saSrcBalance-saAmount); // Create the account. sleDst = boost::make_shared(ltACCOUNT_ROOT); sleDst->setIndex(Ledger::getAccountRootIndex(uDstAccountID)); sleDst->setIFieldAccount(sfAccount, uDstAccountID); sleDst->setIFieldU32(sfSequence, 1); sleDst->setIFieldAmount(sfBalance, saAmount); sleDst->setIFieldAccount(sfAuthorizedKey, uAuthKeyID); accounts.push_back(std::make_pair(taaCREATE, sleDst)); std::cerr << "WalletAdd<" << std::endl; return terSUCCESS; } TransactionEngineResult TransactionEngine::doInvoice(const SerializedTransaction& txn, std::vector& accounts) { return tenUNKNOWN; } TransactionEngineResult TransactionEngine::doOffer(const SerializedTransaction& txn, std::vector& accounts) { return tenUNKNOWN; } TransactionEngineResult TransactionEngine::doTake(const SerializedTransaction& txn, std::vector& accounts) { return tenUNKNOWN; } TransactionEngineResult TransactionEngine::doStore(const SerializedTransaction& txn, std::vector& accounts) { return tenUNKNOWN; } TransactionEngineResult TransactionEngine::doDelete(const SerializedTransaction& txn, std::vector& accounts) { return tenUNKNOWN; } // vim:ts=4