diff --git a/Builds/VisualStudio2012/RippleD.vcxproj.filters b/Builds/VisualStudio2012/RippleD.vcxproj.filters
index 875476374..964828c71 100644
--- a/Builds/VisualStudio2012/RippleD.vcxproj.filters
+++ b/Builds/VisualStudio2012/RippleD.vcxproj.filters
@@ -972,9 +972,6 @@
[1] Ripple\ripple_basics\utility
-
- [1] Ripple\ripple_basics\utility
-
[1] Ripple\ripple_basics\utility
@@ -1692,6 +1689,9 @@
[1] Ripple\ripple_app\node
+
+ [1] Ripple\ripple_basics\utility
+
diff --git a/modules/ripple_app/ripple_app.cpp b/modules/ripple_app/ripple_app.cpp
index 62ad77274..305bd0c82 100644
--- a/modules/ripple_app/ripple_app.cpp
+++ b/modules/ripple_app/ripple_app.cpp
@@ -155,10 +155,10 @@ namespace ripple
#include "src/cpp/ripple/TransactionMaster.h"
#include "src/cpp/ripple/ripple_LocalCredentials.h"
#include "src/cpp/ripple/WSDoor.h"
+#include "src/cpp/ripple/ripple_Application.h"
#include "src/cpp/ripple/RPCHandler.h"
#include "src/cpp/ripple/TransactionQueue.h"
#include "ledger/OrderBookDB.h"
-#include "src/cpp/ripple/ripple_Application.h"
#include "src/cpp/ripple/CallRPC.h"
#include "src/cpp/ripple/Transactor.h"
#include "src/cpp/ripple/ChangeTransactor.h"
diff --git a/modules/ripple_basics/utility/ripple_ScopedLock.h b/modules/ripple_basics/utility/ripple_ScopedLock.h
index a51dd1dd3..a38a53925 100644
--- a/modules/ripple_basics/utility/ripple_ScopedLock.h
+++ b/modules/ripple_basics/utility/ripple_ScopedLock.h
@@ -37,7 +37,7 @@ public:
};
// A class that unlocks on construction and locks on destruction
-
+/*
class ScopedUnlock
{
protected:
@@ -80,5 +80,6 @@ private:
ScopedUnlock (const ScopedUnlock&); // no implementation
ScopedUnlock& operator= (const ScopedUnlock&); // no implementation
};
+*/
#endif
diff --git a/src/cpp/ripple/NetworkOPs.cpp b/src/cpp/ripple/NetworkOPs.cpp
index 2f95ddffd..6b08e8bb6 100644
--- a/src/cpp/ripple/NetworkOPs.cpp
+++ b/src/cpp/ripple/NetworkOPs.cpp
@@ -42,50 +42,53 @@ NetworkOPs::NetworkOPs (LedgerMaster* pLedgerMaster)
void NetworkOPs::processNetTimer ()
{
- ScopedLock sl (getApp().getMasterLock ());
-
- Application& app (getApp ());
- ILoadManager& mgr (app.getLoadManager ());
-
- getApp().getLoadManager ().resetDeadlockDetector ();
-
- std::size_t const numPeers = getApp().getPeers ().getPeerVector ().size ();
-
- // do we have sufficient peers? If not, we are disconnected.
- if (numPeers < theConfig.NETWORK_QUORUM)
{
- if (mMode != omDISCONNECTED)
+ Application::ScopedLockType lock (getApp().getMasterLock (), __FILE__, __LINE__);
+
+ // VFALCO NOTE This is for diagnosing a crash on exit
+ Application& app (getApp ());
+ ILoadManager& mgr (app.getLoadManager ());
+
+ getApp().getLoadManager ().resetDeadlockDetector ();
+
+ std::size_t const numPeers = getApp().getPeers ().getPeerVector ().size ();
+
+ // do we have sufficient peers? If not, we are disconnected.
+ if (numPeers < theConfig.NETWORK_QUORUM)
{
- setMode (omDISCONNECTED);
- WriteLog (lsWARNING, NetworkOPs)
- << "Node count (" << numPeers << ") "
- << "has fallen below quorum (" << theConfig.NETWORK_QUORUM << ").";
+ if (mMode != omDISCONNECTED)
+ {
+ setMode (omDISCONNECTED);
+ WriteLog (lsWARNING, NetworkOPs)
+ << "Node count (" << numPeers << ") "
+ << "has fallen below quorum (" << theConfig.NETWORK_QUORUM << ").";
+ }
+
+ return;
}
- return;
- }
+ if (mMode == omDISCONNECTED)
+ {
+ setMode (omCONNECTED);
+ WriteLog (lsINFO, NetworkOPs) << "Node count (" << numPeers << ") is sufficient.";
+ }
- if (mMode == omDISCONNECTED)
- {
- setMode (omCONNECTED);
- WriteLog (lsINFO, NetworkOPs) << "Node count (" << numPeers << ") is sufficient.";
- }
+ // Check if the last validated ledger forces a change between these states
+ if (mMode == omSYNCING)
+ {
+ setMode (omSYNCING);
+ }
+ else if (mMode == omCONNECTED)
+ {
+ setMode (omCONNECTED);
+ }
- // Check if the last validated ledger forces a change between these states
- if (mMode == omSYNCING)
- {
- setMode (omSYNCING);
- }
- else if (mMode == omCONNECTED)
- {
- setMode (omCONNECTED);
- }
+ if (!mConsensus)
+ tryStartConsensus ();
- if (!mConsensus)
- tryStartConsensus ();
-
- if (mConsensus)
- mConsensus->timerEntry ();
+ if (mConsensus)
+ mConsensus->timerEntry ();
+ }
}
void NetworkOPs::onDeadlineTimer (DeadlineTimer& timer)
@@ -309,71 +312,72 @@ void NetworkOPs::runTransactionQueue ()
{
LoadEvent::autoptr ev = getApp().getJobQueue ().getLoadEventAP (jtTXN_PROC, "runTxnQ");
- boost::recursive_mutex::scoped_lock sl (getApp().getMasterLock ());
-
- Transaction::pointer dbtx = getApp().getMasterTransaction ().fetch (txn->getID (), true);
- assert (dbtx);
-
- bool didApply;
- TER r = mLedgerMaster->doTransaction (dbtx->getSTransaction (),
- tapOPEN_LEDGER | tapNO_CHECK_SIGN, didApply);
- dbtx->setResult (r);
-
- if (isTemMalformed (r)) // malformed, cache bad
- getApp().getHashRouter ().setFlag (txn->getID (), SF_BAD);
-// else if (isTelLocal (r) || isTerRetry (r)) // can be retried
-// getApp().getHashRouter ().setFlag (txn->getID (), SF_RETRY);
-
-
- if (isTerRetry (r))
{
- // transaction should be held
- WriteLog (lsDEBUG, NetworkOPs) << "QTransaction should be held: " << r;
- dbtx->setStatus (HELD);
- getApp().getMasterTransaction ().canonicalize (dbtx);
- mLedgerMaster->addHeldTransaction (dbtx);
- }
- else if (r == tefPAST_SEQ)
- {
- // duplicate or conflict
- WriteLog (lsINFO, NetworkOPs) << "QTransaction is obsolete";
- dbtx->setStatus (OBSOLETE);
- }
- else if (r == tesSUCCESS)
- {
- WriteLog (lsINFO, NetworkOPs) << "QTransaction is now included in open ledger";
- dbtx->setStatus (INCLUDED);
- getApp().getMasterTransaction ().canonicalize (dbtx);
- }
- else
- {
- WriteLog (lsDEBUG, NetworkOPs) << "QStatus other than success " << r;
- dbtx->setStatus (INVALID);
- }
+ Application::ScopedLockType lock (getApp().getMasterLock (), __FILE__, __LINE__);
-// if (didApply || (mMode != omFULL))
- if (didApply)
- {
- std::set peers;
+ Transaction::pointer dbtx = getApp().getMasterTransaction ().fetch (txn->getID (), true);
+ assert (dbtx);
- if (getApp().getHashRouter ().swapSet (txn->getID (), peers, SF_RELAYED))
+ bool didApply;
+ TER r = mLedgerMaster->doTransaction (dbtx->getSTransaction (),
+ tapOPEN_LEDGER | tapNO_CHECK_SIGN, didApply);
+ dbtx->setResult (r);
+
+ if (isTemMalformed (r)) // malformed, cache bad
+ getApp().getHashRouter ().setFlag (txn->getID (), SF_BAD);
+ // else if (isTelLocal (r) || isTerRetry (r)) // can be retried
+ // getApp().getHashRouter ().setFlag (txn->getID (), SF_RETRY);
+
+
+ if (isTerRetry (r))
{
- WriteLog (lsDEBUG, NetworkOPs) << "relaying";
- protocol::TMTransaction tx;
- Serializer s;
- dbtx->getSTransaction ()->add (s);
- tx.set_rawtransaction (&s.getData ().front (), s.getLength ());
- tx.set_status (protocol::tsCURRENT);
- tx.set_receivetimestamp (getNetworkTimeNC ()); // FIXME: This should be when we received it
-
- PackedMessage::pointer packet = boost::make_shared (tx, protocol::mtTRANSACTION);
- getApp().getPeers ().relayMessageBut (peers, packet);
+ // transaction should be held
+ WriteLog (lsDEBUG, NetworkOPs) << "QTransaction should be held: " << r;
+ dbtx->setStatus (HELD);
+ getApp().getMasterTransaction ().canonicalize (dbtx);
+ mLedgerMaster->addHeldTransaction (dbtx);
+ }
+ else if (r == tefPAST_SEQ)
+ {
+ // duplicate or conflict
+ WriteLog (lsINFO, NetworkOPs) << "QTransaction is obsolete";
+ dbtx->setStatus (OBSOLETE);
+ }
+ else if (r == tesSUCCESS)
+ {
+ WriteLog (lsINFO, NetworkOPs) << "QTransaction is now included in open ledger";
+ dbtx->setStatus (INCLUDED);
+ getApp().getMasterTransaction ().canonicalize (dbtx);
}
else
- WriteLog(lsDEBUG, NetworkOPs) << "recently relayed";
- }
+ {
+ WriteLog (lsDEBUG, NetworkOPs) << "QStatus other than success " << r;
+ dbtx->setStatus (INVALID);
+ }
- txn->doCallbacks (r);
+ if (didApply /*|| (mMode != omFULL)*/ )
+ {
+ std::set peers;
+
+ if (getApp().getHashRouter ().swapSet (txn->getID (), peers, SF_RELAYED))
+ {
+ WriteLog (lsDEBUG, NetworkOPs) << "relaying";
+ protocol::TMTransaction tx;
+ Serializer s;
+ dbtx->getSTransaction ()->add (s);
+ tx.set_rawtransaction (&s.getData ().front (), s.getLength ());
+ tx.set_status (protocol::tsCURRENT);
+ tx.set_receivetimestamp (getNetworkTimeNC ()); // FIXME: This should be when we received it
+
+ PackedMessage::pointer packet = boost::make_shared (tx, protocol::mtTRANSACTION);
+ getApp().getPeers ().relayMessageBut (peers, packet);
+ }
+ else
+ WriteLog(lsDEBUG, NetworkOPs) << "recently relayed";
+ }
+
+ txn->doCallbacks (r);
+ }
}
}
@@ -410,77 +414,79 @@ Transaction::pointer NetworkOPs::processTransaction (Transaction::pointer trans,
getApp().getHashRouter ().setFlag (trans->getID (), SF_SIGGOOD);
}
- boost::recursive_mutex::scoped_lock sl (getApp().getMasterLock ());
- bool didApply;
- TER r = mLedgerMaster->doTransaction (trans->getSTransaction (),
- bAdmin ? (tapOPEN_LEDGER | tapNO_CHECK_SIGN | tapADMIN) : (tapOPEN_LEDGER | tapNO_CHECK_SIGN), didApply);
- trans->setResult (r);
+ {
+ Application::ScopedLockType lock (getApp().getMasterLock (), __FILE__, __LINE__);
- if (isTemMalformed (r)) // malformed, cache bad
- getApp().getHashRouter ().setFlag (trans->getID (), SF_BAD);
-// else if (isTelLocal (r) || isTerRetry (r)) // can be retried
-// getApp().getHashRouter ().setFlag (trans->getID (), SF_RETRY);
+ bool didApply;
+ TER r = mLedgerMaster->doTransaction (trans->getSTransaction (),
+ bAdmin ? (tapOPEN_LEDGER | tapNO_CHECK_SIGN | tapADMIN) : (tapOPEN_LEDGER | tapNO_CHECK_SIGN), didApply);
+ trans->setResult (r);
+
+ if (isTemMalformed (r)) // malformed, cache bad
+ getApp().getHashRouter ().setFlag (trans->getID (), SF_BAD);
+ // else if (isTelLocal (r) || isTerRetry (r)) // can be retried
+ // getApp().getHashRouter ().setFlag (trans->getID (), SF_RETRY);
#ifdef BEAST_DEBUG
-
- if (r != tesSUCCESS)
- {
- std::string token, human;
- CondLog (transResultInfo (r, token, human), lsINFO, NetworkOPs) << "TransactionResult: " << token << ": " << human;
- }
+ if (r != tesSUCCESS)
+ {
+ std::string token, human;
+ CondLog (transResultInfo (r, token, human), lsINFO, NetworkOPs) << "TransactionResult: " << token << ": " << human;
+ }
#endif
- if (callback)
- callback (trans, r);
+ if (callback)
+ callback (trans, r);
- if (r == tefFAILURE)
- throw Fault (IO_ERROR);
+ if (r == tefFAILURE)
+ throw Fault (IO_ERROR);
- if (r == tesSUCCESS)
- {
- WriteLog (lsINFO, NetworkOPs) << "Transaction is now included in open ledger";
- trans->setStatus (INCLUDED);
- getApp().getMasterTransaction ().canonicalize (trans);
- }
- else if (r == tefPAST_SEQ)
- {
- // duplicate or conflict
- WriteLog (lsINFO, NetworkOPs) << "Transaction is obsolete";
- trans->setStatus (OBSOLETE);
- }
- else if (isTerRetry (r))
- {
- if (!bFailHard)
+ if (r == tesSUCCESS)
{
- // transaction should be held
- WriteLog (lsDEBUG, NetworkOPs) << "Transaction should be held: " << r;
- trans->setStatus (HELD);
- getApp().getMasterTransaction ().canonicalize (trans);
- mLedgerMaster->addHeldTransaction (trans);
+ WriteLog (lsINFO, NetworkOPs) << "Transaction is now included in open ledger";
+ trans->setStatus (INCLUDED);
+ getApp().getMasterTransaction ().canonicalize (trans);
}
- }
- else
- {
- WriteLog (lsDEBUG, NetworkOPs) << "Status other than success " << r;
- trans->setStatus (INVALID);
- }
-
- if (didApply || ((mMode != omFULL) && !bFailHard))
- {
- std::set peers;
-
- if (getApp().getHashRouter ().swapSet (trans->getID (), peers, SF_RELAYED))
+ else if (r == tefPAST_SEQ)
{
- protocol::TMTransaction tx;
- Serializer s;
- trans->getSTransaction ()->add (s);
- tx.set_rawtransaction (&s.getData ().front (), s.getLength ());
- tx.set_status (protocol::tsCURRENT);
- tx.set_receivetimestamp (getNetworkTimeNC ()); // FIXME: This should be when we received it
+ // duplicate or conflict
+ WriteLog (lsINFO, NetworkOPs) << "Transaction is obsolete";
+ trans->setStatus (OBSOLETE);
+ }
+ else if (isTerRetry (r))
+ {
+ if (!bFailHard)
+ {
+ // transaction should be held
+ WriteLog (lsDEBUG, NetworkOPs) << "Transaction should be held: " << r;
+ trans->setStatus (HELD);
+ getApp().getMasterTransaction ().canonicalize (trans);
+ mLedgerMaster->addHeldTransaction (trans);
+ }
+ }
+ else
+ {
+ WriteLog (lsDEBUG, NetworkOPs) << "Status other than success " << r;
+ trans->setStatus (INVALID);
+ }
- PackedMessage::pointer packet = boost::make_shared (tx, protocol::mtTRANSACTION);
- getApp().getPeers ().relayMessageBut (peers, packet);
+ if (didApply || ((mMode != omFULL) && !bFailHard))
+ {
+ std::set peers;
+
+ if (getApp().getHashRouter ().swapSet (trans->getID (), peers, SF_RELAYED))
+ {
+ protocol::TMTransaction tx;
+ Serializer s;
+ trans->getSTransaction ()->add (s);
+ tx.set_rawtransaction (&s.getData ().front (), s.getLength ());
+ tx.set_status (protocol::tsCURRENT);
+ tx.set_receivetimestamp (getNetworkTimeNC ()); // FIXME: This should be when we received it
+
+ PackedMessage::pointer packet = boost::make_shared (tx, protocol::mtTRANSACTION);
+ getApp().getPeers ().relayMessageBut (peers, packet);
+ }
}
}
@@ -958,49 +964,53 @@ uint256 NetworkOPs::getConsensusLCL ()
void NetworkOPs::processTrustedProposal (LedgerProposal::pointer proposal,
boost::shared_ptr set, RippleAddress nodePublic, uint256 checkLedger, bool sigGood)
{
- boost::recursive_mutex::scoped_lock sl (getApp().getMasterLock ());
-
- bool relay = true;
-
- if (!haveConsensusObject ())
{
- WriteLog (lsINFO, NetworkOPs) << "Received proposal outside consensus window";
+ Application::ScopedLockType lock (getApp().getMasterLock (), __FILE__, __LINE__);
- if (mMode == omFULL)
- relay = false;
- }
- else
- {
- storeProposal (proposal, nodePublic);
+ bool relay = true;
- uint256 consensusLCL = mConsensus->getLCL ();
-
- if (!set->has_previousledger () && (checkLedger != consensusLCL))
+ if (!haveConsensusObject ())
{
- WriteLog (lsWARNING, NetworkOPs) << "Have to re-check proposal signature due to consensus view change";
- assert (proposal->hasSignature ());
- proposal->setPrevLedger (consensusLCL);
+ WriteLog (lsINFO, NetworkOPs) << "Received proposal outside consensus window";
- if (proposal->checkSign ())
- sigGood = true;
+ if (mMode == omFULL)
+ relay = false;
+ }
+ else
+ {
+ storeProposal (proposal, nodePublic);
+
+ uint256 consensusLCL = mConsensus->getLCL ();
+
+ if (!set->has_previousledger () && (checkLedger != consensusLCL))
+ {
+ WriteLog (lsWARNING, NetworkOPs) << "Have to re-check proposal signature due to consensus view change";
+ assert (proposal->hasSignature ());
+ proposal->setPrevLedger (consensusLCL);
+
+ if (proposal->checkSign ())
+ sigGood = true;
+ }
+
+ if (sigGood && (consensusLCL == proposal->getPrevLedger ()))
+ {
+ relay = mConsensus->peerPosition (proposal);
+ WriteLog (lsTRACE, NetworkOPs) << "Proposal processing finished, relay=" << relay;
+ }
}
- if (sigGood && (consensusLCL == proposal->getPrevLedger ()))
+ if (relay)
{
- relay = mConsensus->peerPosition (proposal);
- WriteLog (lsTRACE, NetworkOPs) << "Proposal processing finished, relay=" << relay;
+ std::set peers;
+ getApp().getHashRouter ().swapSet (proposal->getHashRouter (), peers, SF_RELAYED);
+ PackedMessage::pointer message = boost::make_shared (*set, protocol::mtPROPOSE_LEDGER);
+ getApp().getPeers ().relayMessageBut (peers, message);
+ }
+ else
+ {
+ WriteLog (lsINFO, NetworkOPs) << "Not relaying trusted proposal";
}
}
-
- if (relay)
- {
- std::set peers;
- getApp().getHashRouter ().swapSet (proposal->getHashRouter (), peers, SF_RELAYED);
- PackedMessage::pointer message = boost::make_shared (*set, protocol::mtPROPOSE_LEDGER);
- getApp().getPeers ().relayMessageBut (peers, message);
- }
- else
- WriteLog (lsINFO, NetworkOPs) << "Not relaying trusted proposal";
}
SHAMap::pointer NetworkOPs::getTXMap (uint256 const& hash)
@@ -1042,8 +1052,10 @@ SHAMapAddNode NetworkOPs::gotTXData (const boost::shared_ptr& peer, uint25
{
boost::shared_ptr consensus;
+
{
- ScopedLock mlh(getApp().getMasterLock());
+ Application::ScopedLockType lock (getApp ().getMasterLock (), __FILE__, __LINE__);
+
consensus = mConsensus;
}
diff --git a/src/cpp/ripple/RPCHandler.cpp b/src/cpp/ripple/RPCHandler.cpp
index 3329e05ca..5de7f0e1d 100644
--- a/src/cpp/ripple/RPCHandler.cpp
+++ b/src/cpp/ripple/RPCHandler.cpp
@@ -58,7 +58,7 @@ RPCHandler::RPCHandler (NetworkOPs* netOps, InfoSub::pointer infoSub) : mNetOps
;
}
-Json::Value RPCHandler::transactionSign (Json::Value params, bool bSubmit, bool bFailHard, ScopedLock& mlh)
+Json::Value RPCHandler::transactionSign (Json::Value params, bool bSubmit, bool bFailHard, Application::ScopedLockType& mlh)
{
if (getApp().getFeeTrack().isLoadedCluster() && (mRole != ADMIN))
return rpcError(rpcTOO_BUSY);
@@ -595,7 +595,7 @@ Json::Value RPCHandler::accountFromString (Ledger::ref lrLedger, RippleAddress&
// ledger_hash :
// ledger_index :
// }
-Json::Value RPCHandler::doAccountInfo (Json::Value params, LoadType* loadType, ScopedLock& MasterLockHolder)
+Json::Value RPCHandler::doAccountInfo (Json::Value params, LoadType* loadType, Application::ScopedLockType& masterLockHolder)
{
Ledger::pointer lpLedger;
Json::Value jvResult = lookupLedger (params, lpLedger);
@@ -640,7 +640,7 @@ Json::Value RPCHandler::doAccountInfo (Json::Value params, LoadType* loadType, S
// port:
// }
// XXX Might allow domain for manual connections.
-Json::Value RPCHandler::doConnect (Json::Value params, LoadType* loadType, ScopedLock& MasterLockHolder)
+Json::Value RPCHandler::doConnect (Json::Value params, LoadType* loadType, Application::ScopedLockType& masterLockHolder)
{
if (theConfig.RUN_STANDALONE)
return "cannot connect in standalone mode";
@@ -661,7 +661,7 @@ Json::Value RPCHandler::doConnect (Json::Value params, LoadType* loadType, Scope
// {
// key:
// }
-Json::Value RPCHandler::doDataDelete (Json::Value params, LoadType* loadType, ScopedLock& MasterLockHolder)
+Json::Value RPCHandler::doDataDelete (Json::Value params, LoadType* loadType, Application::ScopedLockType& masterLockHolder)
{
if (!params.isMember ("key"))
return rpcError (rpcINVALID_PARAMS);
@@ -687,7 +687,7 @@ Json::Value RPCHandler::doDataDelete (Json::Value params, LoadType* loadType, Sc
// {
// key:
// }
-Json::Value RPCHandler::doDataFetch (Json::Value params, LoadType* loadType, ScopedLock& MasterLockHolder)
+Json::Value RPCHandler::doDataFetch (Json::Value params, LoadType* loadType, Application::ScopedLockType& masterLockHolder)
{
if (!params.isMember ("key"))
return rpcError (rpcINVALID_PARAMS);
@@ -711,7 +711,7 @@ Json::Value RPCHandler::doDataFetch (Json::Value params, LoadType* loadType, Sco
// key:
// value:
// }
-Json::Value RPCHandler::doDataStore (Json::Value params, LoadType* loadType, ScopedLock& MasterLockHolder)
+Json::Value RPCHandler::doDataStore (Json::Value params, LoadType* loadType, Application::ScopedLockType& masterLockHolder)
{
if (!params.isMember ("key")
|| !params.isMember ("value"))
@@ -772,7 +772,7 @@ Json::Value RPCHandler::doNicknameInfo (Json::Value params)
// 'account_index' : // optional
// }
// XXX This would be better if it took the ledger.
-Json::Value RPCHandler::doOwnerInfo (Json::Value params, LoadType* loadType, ScopedLock& MasterLockHolder)
+Json::Value RPCHandler::doOwnerInfo (Json::Value params, LoadType* loadType, Application::ScopedLockType& masterLockHolder)
{
if (!params.isMember ("account") && !params.isMember ("ident"))
return rpcError (rpcINVALID_PARAMS);
@@ -797,7 +797,7 @@ Json::Value RPCHandler::doOwnerInfo (Json::Value params, LoadType* loadType, Sco
return ret;
}
-Json::Value RPCHandler::doPeers (Json::Value, LoadType* loadType, ScopedLock& MasterLockHolder)
+Json::Value RPCHandler::doPeers (Json::Value, LoadType* loadType, Application::ScopedLockType& masterLockHolder)
{
Json::Value jvResult (Json::objectValue);
@@ -808,7 +808,7 @@ Json::Value RPCHandler::doPeers (Json::Value, LoadType* loadType, ScopedLock& Ma
return jvResult;
}
-Json::Value RPCHandler::doPing (Json::Value, LoadType* loadType, ScopedLock& MasterLockHolder)
+Json::Value RPCHandler::doPing (Json::Value, LoadType* loadType, Application::ScopedLockType& masterLockHolder)
{
return Json::Value (Json::objectValue);
}
@@ -818,7 +818,7 @@ Json::Value RPCHandler::doPing (Json::Value, LoadType* loadType, ScopedLock& Mas
// issuer is the offering account
// --> submit: 'submit|true|false': defaults to false
// Prior to running allow each to have a credit line of what they will be getting from the other account.
-Json::Value RPCHandler::doProfile (Json::Value params, LoadType* loadType, ScopedLock& MasterLockHolder)
+Json::Value RPCHandler::doProfile (Json::Value params, LoadType* loadType, Application::ScopedLockType& masterLockHolder)
{
/* need to fix now that sharedOfferCreate is gone
int iArgs = params.size();
@@ -910,9 +910,9 @@ Json::Value RPCHandler::doProfile (Json::Value params, LoadType* loadType, Scope
// difficulty: // optional
// secret: // optional
// }
-Json::Value RPCHandler::doProofCreate (Json::Value params, LoadType* loadType, ScopedLock& MasterLockHolder)
+Json::Value RPCHandler::doProofCreate (Json::Value params, LoadType* loadType, Application::ScopedLockType& masterLockHolder)
{
- MasterLockHolder.unlock ();
+ masterLockHolder.unlock ();
// XXX: Add ability to create proof with arbitrary time
Json::Value jvResult (Json::objectValue);
@@ -955,9 +955,9 @@ Json::Value RPCHandler::doProofCreate (Json::Value params, LoadType* loadType, S
// {
// token:
// }
-Json::Value RPCHandler::doProofSolve (Json::Value params, LoadType* loadType, ScopedLock& MasterLockHolder)
+Json::Value RPCHandler::doProofSolve (Json::Value params, LoadType* loadType, Application::ScopedLockType& masterLockHolder)
{
- MasterLockHolder.unlock ();
+ masterLockHolder.unlock ();
Json::Value jvResult;
@@ -985,9 +985,9 @@ Json::Value RPCHandler::doProofSolve (Json::Value params, LoadType* loadType, Sc
// difficulty: // optional
// secret: // optional
// }
-Json::Value RPCHandler::doProofVerify (Json::Value params, LoadType* loadType, ScopedLock& MasterLockHolder)
+Json::Value RPCHandler::doProofVerify (Json::Value params, LoadType* loadType, Application::ScopedLockType& masterLockHolder)
{
- MasterLockHolder.unlock ();
+ masterLockHolder.unlock ();
// XXX Add ability to check proof against arbitrary time
Json::Value jvResult;
@@ -1055,7 +1055,7 @@ Json::Value RPCHandler::doProofVerify (Json::Value params, LoadType* loadType, S
// ledger_hash :
// ledger_index :
// }
-Json::Value RPCHandler::doAccountLines (Json::Value params, LoadType* loadType, ScopedLock& MasterLockHolder)
+Json::Value RPCHandler::doAccountLines (Json::Value params, LoadType* loadType, Application::ScopedLockType& masterLockHolder)
{
Ledger::pointer lpLedger;
Json::Value jvResult = lookupLedger (params, lpLedger);
@@ -1067,7 +1067,7 @@ Json::Value RPCHandler::doAccountLines (Json::Value params, LoadType* loadType,
if (lpLedger->isImmutable ())
{
- MasterLockHolder.unlock ();
+ masterLockHolder.unlock ();
bUnlocked = true;
}
@@ -1140,7 +1140,7 @@ Json::Value RPCHandler::doAccountLines (Json::Value params, LoadType* loadType,
}
if (!bUnlocked)
- MasterLockHolder.unlock ();
+ masterLockHolder.unlock ();
}
else
{
@@ -1168,7 +1168,7 @@ static void offerAdder (Json::Value& jvLines, SLE::ref offer)
// ledger_hash :
// ledger_index :
// }
-Json::Value RPCHandler::doAccountOffers (Json::Value params, LoadType* loadType, ScopedLock& MasterLockHolder)
+Json::Value RPCHandler::doAccountOffers (Json::Value params, LoadType* loadType, Application::ScopedLockType& masterLockHolder)
{
Ledger::pointer lpLedger;
Json::Value jvResult = lookupLedger (params, lpLedger);
@@ -1180,7 +1180,7 @@ Json::Value RPCHandler::doAccountOffers (Json::Value params, LoadType* loadType,
if (lpLedger->isImmutable ())
{
- MasterLockHolder.unlock ();
+ masterLockHolder.unlock ();
bUnlocked = true;
}
@@ -1212,7 +1212,7 @@ Json::Value RPCHandler::doAccountOffers (Json::Value params, LoadType* loadType,
lpLedger->visitAccountItems (raAccount.getAccountID (), BIND_TYPE (&offerAdder, boost::ref (jvsOffers), P_1));
if (!bUnlocked)
- MasterLockHolder.unlock ();
+ masterLockHolder.unlock ();
return jvResult;
}
@@ -1227,7 +1227,7 @@ Json::Value RPCHandler::doAccountOffers (Json::Value params, LoadType* loadType,
// "limit" : integer, // Optional.
// "proof" : boolean // Defaults to false.
// }
-Json::Value RPCHandler::doBookOffers (Json::Value params, LoadType* loadType, ScopedLock& MasterLockHolder)
+Json::Value RPCHandler::doBookOffers (Json::Value params, LoadType* loadType, Application::ScopedLockType& masterLockHolder)
{
if (getApp().getJobQueue ().getJobCountGE (jtCLIENT) > 200)
{
@@ -1241,7 +1241,7 @@ Json::Value RPCHandler::doBookOffers (Json::Value params, LoadType* loadType, Sc
return jvResult;
if (lpLedger->isImmutable ())
- MasterLockHolder.unlock ();
+ masterLockHolder.unlock ();
if (!params.isMember ("taker_pays") || !params.isMember ("taker_gets") || !params["taker_pays"].isObject () || !params["taker_gets"].isObject ())
return rpcError (rpcINVALID_PARAMS);
@@ -1328,9 +1328,9 @@ Json::Value RPCHandler::doBookOffers (Json::Value params, LoadType* loadType, Sc
// {
// random:
// }
-Json::Value RPCHandler::doRandom (Json::Value params, LoadType* loadType, ScopedLock& MasterLockHolder)
+Json::Value RPCHandler::doRandom (Json::Value params, LoadType* loadType, Application::ScopedLockType& masterLockHolder)
{
- MasterLockHolder.unlock ();
+ masterLockHolder.unlock ();
uint256 uRandom;
try
@@ -1349,7 +1349,7 @@ Json::Value RPCHandler::doRandom (Json::Value params, LoadType* loadType, Scoped
}
}
-Json::Value RPCHandler::doPathFind (Json::Value params, LoadType* loadType, ScopedLock& MasterLockHolder)
+Json::Value RPCHandler::doPathFind (Json::Value params, LoadType* loadType, Application::ScopedLockType& masterLockHolder)
{
if (!params.isMember ("subcommand") || !params["subcommand"].isString ())
return rpcError (rpcINVALID_PARAMS);
@@ -1404,7 +1404,7 @@ Json::Value RPCHandler::doPathFind (Json::Value params, LoadType* loadType, Scop
// - Allows clients to verify path exists.
// - Return canonicalized path.
// - From a trusted server, allows clients to use path without manipulation.
-Json::Value RPCHandler::doRipplePathFind (Json::Value params, LoadType* loadType, ScopedLock& MasterLockHolder)
+Json::Value RPCHandler::doRipplePathFind (Json::Value params, LoadType* loadType, Application::ScopedLockType& masterLockHolder)
{
int jc = getApp().getJobQueue ().getJobCountGE (jtCLIENT);
@@ -1487,7 +1487,7 @@ Json::Value RPCHandler::doRipplePathFind (Json::Value params, LoadType* loadType
*loadType = LT_RPCBurden;
Ledger::pointer lSnapShot = boost::make_shared (boost::ref (*lpLedger), false);
- MasterLockHolder.unlock (); // As long as we have a locked copy of the ledger, we can unlock.
+ masterLockHolder.unlock (); // As long as we have a locked copy of the ledger, we can unlock.
// Fill in currencies destination will accept
Json::Value jvDestCur (Json::arrayValue);
@@ -1636,23 +1636,23 @@ Json::Value RPCHandler::doRipplePathFind (Json::Value params, LoadType* loadType
// tx_json: