use of com.radixdlt.constraintmachine.Authorization in project radixdlt by radixdlt.
the class RoundUpdateConstraintScrypt method main.
@Override
public void main(Loader os) {
os.substate(new SubstateDefinition<>(ValidatorBFTData.class, SubstateTypeId.VALIDATOR_BFT_DATA.id(), buf -> {
REFieldSerialization.deserializeReservedByte(buf);
var key = REFieldSerialization.deserializeKey(buf);
var proposalsCompleted = REFieldSerialization.deserializeNonNegativeLong(buf);
var proposalsMissed = REFieldSerialization.deserializeNonNegativeLong(buf);
return new ValidatorBFTData(key, proposalsCompleted, proposalsMissed);
}, (s, buf) -> {
REFieldSerialization.serializeReservedByte(buf);
REFieldSerialization.serializeKey(buf, s.validatorKey());
buf.putLong(s.completedProposals());
buf.putLong(s.missedProposals());
}, (k, buf) -> REFieldSerialization.serializeKey(buf, (ECPublicKey) k)));
os.procedure(new DownProcedure<>(VoidReducerState.class, RoundData.class, d -> new Authorization(PermissionLevel.SUPER_USER, (r, c) -> {
}), (d, s, r, c) -> ReducerResult.incomplete(new EndPrevRound(d))));
os.procedure(new DownProcedure<>(EndPrevRound.class, ValidatorBFTData.class, d -> new Authorization(PermissionLevel.SUPER_USER, (r, c) -> {
}), (d, s, r, c) -> {
var closedRound = s.getClosedRound().view();
var next = new StartValidatorBFTUpdate(closedRound);
next.beginUpdate(d);
return ReducerResult.incomplete(next);
}));
os.procedure(new DownProcedure<>(StartValidatorBFTUpdate.class, ValidatorBFTData.class, d -> new Authorization(PermissionLevel.SUPER_USER, (r, c) -> {
}), (d, s, r, c) -> ReducerResult.incomplete(s.beginUpdate(d))));
os.procedure(new UpProcedure<>(StartValidatorBFTUpdate.class, ValidatorBFTData.class, u -> new Authorization(PermissionLevel.SUPER_USER, (r, c) -> {
}), (s, u, c, r) -> {
var next = s.exit();
return ReducerResult.incomplete(next.update(u, c));
}));
os.procedure(new UpProcedure<>(UpdatingValidatorBFTData.class, ValidatorBFTData.class, u -> new Authorization(PermissionLevel.SUPER_USER, (r, c) -> {
}), (s, u, c, r) -> ReducerResult.incomplete(s.update(u, c))));
os.procedure(new UpProcedure<>(StartNextRound.class, RoundData.class, u -> new Authorization(PermissionLevel.SUPER_USER, (r, c) -> {
}), (s, u, c, r) -> {
s.update(u);
return ReducerResult.complete();
}));
}
use of com.radixdlt.constraintmachine.Authorization in project radixdlt by radixdlt.
the class StakingConstraintScryptV4 method defineStaking.
private void defineStaking(Loader os) {
// Stake
os.procedure(new ReadProcedure<>(TokenHoldingBucket.class, AllowDelegationFlag.class, u -> new Authorization(PermissionLevel.USER, (r, c) -> {
}), (s, d, r) -> {
var nextState = (!d.allowsDelegation()) ? new OwnerStakePrepare(s, d) : new StakePrepare(s, d.validatorKey(), p -> true);
return ReducerResult.incomplete(nextState);
}));
os.procedure(new ReadProcedure<>(OwnerStakePrepare.class, ValidatorOwnerCopy.class, u -> new Authorization(PermissionLevel.USER, (r, c) -> {
}), (s, d, r) -> {
var nextState = s.readOwner(d);
return ReducerResult.incomplete(nextState);
}));
os.procedure(new UpProcedure<>(StakePrepare.class, PreparedStake.class, u -> new Authorization(PermissionLevel.USER, (r, c) -> {
}), (s, u, c, r) -> {
var nextState = s.withdrawTo(u);
return ReducerResult.incomplete(nextState);
}));
// Unstake
os.procedure(new DownProcedure<>(VoidReducerState.class, StakeOwnership.class, d -> d.bucket().withdrawAuthorization(), (d, s, r, c) -> ReducerResult.incomplete(new StakeOwnershipHoldingBucket(d))));
// Additional Unstake
os.procedure(new DownProcedure<>(StakeOwnershipHoldingBucket.class, StakeOwnership.class, d -> d.bucket().withdrawAuthorization(), (d, s, r, c) -> {
s.depositOwnership(d);
return ReducerResult.incomplete(s);
}));
// Change
os.procedure(new UpProcedure<>(StakeOwnershipHoldingBucket.class, StakeOwnership.class, u -> new Authorization(PermissionLevel.USER, (r, c) -> {
}), (s, u, c, r) -> {
var ownership = s.withdrawOwnership(u.amount());
if (!ownership.equals(u)) {
throw new MismatchException(ownership, u);
}
return ReducerResult.incomplete(s);
}));
os.procedure(new UpProcedure<>(StakeOwnershipHoldingBucket.class, PreparedUnstakeOwnership.class, u -> new Authorization(PermissionLevel.USER, (r, c) -> {
}), (s, u, c, r) -> {
var unstake = s.unstake(u.amount());
if (!unstake.equals(u)) {
throw new MismatchException(unstake, u);
}
return ReducerResult.incomplete(s);
}));
// Deallocate Stake Holding Bucket
os.procedure(new EndProcedure<>(StakeOwnershipHoldingBucket.class, s -> new Authorization(PermissionLevel.USER, (r, c) -> {
}), (s, c, r) -> s.destroy()));
}
use of com.radixdlt.constraintmachine.Authorization in project radixdlt by radixdlt.
the class SystemConstraintScrypt method main.
@Override
public void main(Loader os) {
os.substate(VirtualParent.SUBSTATE_DEFINITION);
// TODO: Down singleton
os.procedure(new UpProcedure<>(VoidReducerState.class, VirtualParent.class, u -> new Authorization(PermissionLevel.SYSTEM, (r, c) -> {
}), (s, u, c, r) -> {
if (u.data().length != 1) {
throw new ProcedureException("Invalid data: " + Bytes.toHexString(u.data()));
}
if (u.data()[0] != SubstateTypeId.UNCLAIMED_READDR.id()) {
throw new ProcedureException("Invalid data: " + Bytes.toHexString(u.data()));
}
return ReducerResult.complete();
}));
os.substate(EpochData.SUBSTATE_DEFINITION);
os.substate(RoundData.SUBSTATE_DEFINITION);
os.procedure(new SystemCallProcedure<>(TokenHoldingBucket.class, REAddr.ofSystem(), () -> new Authorization(PermissionLevel.USER, (r, c) -> {
}), (s, d, c) -> {
var id = d.get(0);
var syscall = Syscall.of(id).orElseThrow(() -> new ProcedureException("Invalid call type " + id));
if (syscall != Syscall.FEE_RESERVE_PUT) {
throw new ProcedureException("Invalid call type: " + syscall);
}
var amt = d.getUInt256(1);
var tokens = s.withdraw(REAddr.ofNativeToken(), amt);
c.depositFeeReserve(tokens);
return ReducerResult.incomplete(s);
}));
os.procedure(new SystemCallProcedure<>(VoidReducerState.class, REAddr.ofSystem(), () -> new Authorization(PermissionLevel.USER, (r, c) -> {
}), (s, d, c) -> {
var id = d.get(0);
var syscall = Syscall.of(id).orElseThrow(() -> new ProcedureException("Invalid call type " + id));
if (syscall == Syscall.FEE_RESERVE_TAKE) {
var amt = d.getUInt256(1);
var tokens = c.withdrawFeeReserve(amt);
return ReducerResult.incomplete(new TokenHoldingBucket(tokens));
} else if (syscall == Syscall.READDR_CLAIM) {
var bytes = d.getRemainingBytes(1);
if (bytes.length > MAX_SYMBOL_LENGTH) {
throw new ProcedureException("Address claim too large.");
}
return ReducerResult.incomplete(new REAddrClaimStart(bytes));
} else {
throw new ProcedureException("Invalid call type: " + syscall);
}
}));
// PUB_KEY type is already claimed by accounts
os.substate(UnclaimedREAddr.SUBSTATE_DEFINITION);
os.procedure(new DownProcedure<>(REAddrClaimStart.class, UnclaimedREAddr.class, d -> {
final PermissionLevel permissionLevel;
if (d.addr().isNativeToken() || d.addr().isSystem()) {
permissionLevel = PermissionLevel.SYSTEM;
} else {
permissionLevel = PermissionLevel.USER;
}
return new Authorization(permissionLevel, (r, ctx) -> {
});
}, (d, s, r, c) -> ReducerResult.incomplete(s.claim(d, c))));
// For Mainnet Genesis
os.procedure(new UpProcedure<>(SystemConstraintScrypt.REAddrClaim.class, EpochData.class, u -> new Authorization(PermissionLevel.SYSTEM, (r, c) -> {
}), (s, u, c, r) -> {
if (u.epoch() != 0) {
throw new ProcedureException("First epoch must be 0.");
}
return ReducerResult.incomplete(new AllocatingSystem());
}));
os.procedure(new UpProcedure<>(AllocatingSystem.class, RoundData.class, u -> new Authorization(PermissionLevel.SYSTEM, (r, c) -> {
}), (s, u, c, r) -> {
if (u.view() != 0) {
throw new ProcedureException("First view must be 0.");
}
return ReducerResult.incomplete(new AllocatingVirtualState());
}));
os.procedure(new UpProcedure<>(AllocatingVirtualState.class, VirtualParent.class, u -> new Authorization(PermissionLevel.SYSTEM, (r, c) -> {
}), (s, u, c, r) -> {
var next = s.createVirtualSubstate(u);
return next == null ? ReducerResult.complete() : ReducerResult.incomplete(next);
}));
}
use of com.radixdlt.constraintmachine.Authorization in project radixdlt by radixdlt.
the class ValidatorRegisterConstraintScrypt method main.
@Override
public void main(Loader os) {
os.substate(new SubstateDefinition<>(ValidatorRegisteredCopy.class, SubstateTypeId.VALIDATOR_REGISTERED_FLAG_COPY.id(), buf -> {
REFieldSerialization.deserializeReservedByte(buf);
var epochUpdate = REFieldSerialization.deserializeOptionalNonNegativeLong(buf);
var key = REFieldSerialization.deserializeKey(buf);
var flag = REFieldSerialization.deserializeBoolean(buf);
return new ValidatorRegisteredCopy(epochUpdate, key, flag);
}, (s, buf) -> {
REFieldSerialization.serializeReservedByte(buf);
REFieldSerialization.serializeOptionalLong(buf, s.epochUpdate());
REFieldSerialization.serializeKey(buf, s.validatorKey());
buf.put((byte) (s.isRegistered() ? 1 : 0));
}, buf -> REFieldSerialization.deserializeKey(buf), (k, buf) -> REFieldSerialization.serializeKey(buf, (ECPublicKey) k), k -> new ValidatorRegisteredCopy(OptionalLong.empty(), (ECPublicKey) k, false)));
os.procedure(new DownProcedure<>(VoidReducerState.class, ValidatorRegisteredCopy.class, d -> new Authorization(PermissionLevel.USER, (r, c) -> {
if (!c.key().map(d.validatorKey()::equals).orElse(false)) {
throw new AuthorizationException("Key does not match.");
}
}), (d, s, r, c) -> {
return ReducerResult.incomplete(new UpdatingRegisteredNeedToReadEpoch(d.validatorKey()));
}));
os.procedure(new ReadProcedure<>(UpdatingRegisteredNeedToReadEpoch.class, EpochData.class, u -> new Authorization(PermissionLevel.USER, (r, c) -> {
}), (s, u, r) -> ReducerResult.incomplete(s.readEpoch(u))));
os.procedure(new UpProcedure<>(UpdatingRegistered.class, ValidatorRegisteredCopy.class, u -> new Authorization(PermissionLevel.USER, (r, c) -> {
}), (s, u, c, r) -> {
s.update(u);
return ReducerResult.complete();
}));
}
use of com.radixdlt.constraintmachine.Authorization in project radixdlt by radixdlt.
the class ValidatorUpdateRakeConstraintScrypt method main.
@Override
public void main(Loader os) {
os.substate(new SubstateDefinition<>(ValidatorFeeCopy.class, SubstateTypeId.VALIDATOR_RAKE_COPY.id(), buf -> {
REFieldSerialization.deserializeReservedByte(buf);
OptionalLong epochUpdate = REFieldSerialization.deserializeOptionalNonNegativeLong(buf);
var key = REFieldSerialization.deserializeKey(buf);
var curRakePercentage = REFieldSerialization.deserializeInt(buf);
if (curRakePercentage < RAKE_MIN || curRakePercentage > RAKE_MAX) {
throw new DeserializeException("Invalid rake percentage " + curRakePercentage);
}
return new ValidatorFeeCopy(epochUpdate, key, curRakePercentage);
}, (s, buf) -> {
REFieldSerialization.serializeReservedByte(buf);
REFieldSerialization.serializeOptionalLong(buf, s.epochUpdate());
REFieldSerialization.serializeKey(buf, s.validatorKey());
buf.putInt(s.curRakePercentage());
}, buf -> REFieldSerialization.deserializeKey(buf), (k, buf) -> REFieldSerialization.serializeKey(buf, (ECPublicKey) k), k -> ValidatorFeeCopy.createVirtual((ECPublicKey) k)));
os.procedure(new DownProcedure<>(VoidReducerState.class, ValidatorFeeCopy.class, d -> new Authorization(PermissionLevel.USER, (r, c) -> {
if (!c.key().map(d.validatorKey()::equals).orElse(false)) {
throw new AuthorizationException("Key does not match.");
}
}), (d, s, r, c) -> {
return ReducerResult.incomplete(new UpdatingRakeNeedToReadCurrentRake(d.validatorKey()));
}));
os.procedure(new ReadProcedure<>(UpdatingRakeNeedToReadEpoch.class, EpochData.class, u -> new Authorization(PermissionLevel.USER, (r, c) -> {
}), (s, u, r) -> ReducerResult.incomplete(s.readEpoch(u))));
os.procedure(new ReadProcedure<>(UpdatingRakeNeedToReadCurrentRake.class, ValidatorStakeData.class, u -> new Authorization(PermissionLevel.USER, (r, c) -> {
}), (s, u, r) -> ReducerResult.incomplete(s.readValidatorStakeState(u))));
os.procedure(new UpProcedure<>(UpdatingRakeReady.class, ValidatorFeeCopy.class, u -> new Authorization(PermissionLevel.USER, (r, c) -> {
}), (s, u, c, r) -> {
s.update(u);
return ReducerResult.complete();
}));
}
Aggregations