forked from TrueCloudLab/frostfs-contract
Update withdraw mechanism
Withdraw operation works a bit different with neo:morph. User calls "Deposit" and "Withdraw" methods that produce notifications for the inner ring nodes. "Deposit" method does not produce feedback, but "Withdraw" does. Inner ring nodes check if user eligible to withdraw assets. If so, nodes invoke "Cheque" method. This method collects invocations from inner ring nods. When there are 2/3n + 1 invocations, smart-contract transfers assets back to the user and produces notifications.
This commit is contained in:
parent
88e73a04d7
commit
cb00b6133e
1 changed files with 60 additions and 61 deletions
|
@ -20,7 +20,6 @@ type (
|
||||||
|
|
||||||
check struct {
|
check struct {
|
||||||
id []byte
|
id []byte
|
||||||
height []byte
|
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -148,39 +147,74 @@ func Main(op string, args []interface{}) interface{} {
|
||||||
|
|
||||||
runtime.Log("funds have been transferred")
|
runtime.Log("funds have been transferred")
|
||||||
|
|
||||||
|
var rcv = []byte{}
|
||||||
|
if len(args) == 3 {
|
||||||
|
rcv = args[2].([]byte) // todo: check if rcv value is valid
|
||||||
|
}
|
||||||
|
|
||||||
|
runtime.Notify("Deposit", pk, amount, rcv)
|
||||||
|
|
||||||
return true
|
return true
|
||||||
case "Withdraw":
|
case "Withdraw":
|
||||||
from := engine.GetExecutingScriptHash()
|
if len(args) != 2 {
|
||||||
data := args[0].([]byte)
|
panic("withdraw: bad arguments")
|
||||||
message := data[0:66]
|
|
||||||
uuid := data[0:25]
|
|
||||||
owner := data[25:50]
|
|
||||||
value := data[50:58]
|
|
||||||
height := data[58:66]
|
|
||||||
offset := 68
|
|
||||||
usedList := getSerialized(ctx, "UsedVerifCheckList").([]check)
|
|
||||||
|
|
||||||
c := check{
|
|
||||||
id: uuid,
|
|
||||||
height: height,
|
|
||||||
}
|
|
||||||
if containsCheck(usedList, c) {
|
|
||||||
panic("verification check has already been used")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
user := args[0].([]byte)
|
||||||
|
if !runtime.CheckWitness(user) {
|
||||||
|
// todo: consider something different with neoID
|
||||||
|
panic("withdraw: you should be the owner of the account")
|
||||||
|
}
|
||||||
|
|
||||||
|
amount := args[1].(int)
|
||||||
|
if amount > 0 {
|
||||||
|
amount = amount * 100000000
|
||||||
|
}
|
||||||
|
|
||||||
|
runtime.Notify("Withdraw", user, amount)
|
||||||
|
|
||||||
|
return true
|
||||||
|
case "Cheque":
|
||||||
|
if len(args) != 4 {
|
||||||
|
panic("cheque: bad arguments")
|
||||||
|
}
|
||||||
|
|
||||||
|
id := args[0].([]byte) // unique cheque id
|
||||||
|
user := args[1].([]byte) // GAS receiver
|
||||||
|
amount := args[2].(int) // amount of GAS
|
||||||
|
lockAcc := args[3].([]byte) // lock account from internal banking that must be cashed out
|
||||||
|
|
||||||
|
ctx := storage.GetContext()
|
||||||
|
|
||||||
|
hashID := crypto.Hash256(id)
|
||||||
irList := getSerialized(ctx, "InnerRingList").([]node)
|
irList := getSerialized(ctx, "InnerRingList").([]node)
|
||||||
if !verifySignatures(irList, data, message, offset) {
|
usedList := getSerialized(ctx, "UsedVerifCheckList").([]check)
|
||||||
panic("can't verify signatures")
|
threshold := len(irList)/3*2 + 1
|
||||||
|
|
||||||
|
if !isInnerRingRequest(irList) {
|
||||||
|
panic("cheque: invoked by non inner ring node")
|
||||||
}
|
}
|
||||||
|
|
||||||
h := owner[1:21]
|
c := check{id: id} // todo: use different cheque id for inner ring update and withdraw
|
||||||
params := []interface{}{from, h, value}
|
if containsCheck(usedList, c) {
|
||||||
|
panic("cheque: non unique id")
|
||||||
|
}
|
||||||
|
|
||||||
|
n := vote(ctx, hashID)
|
||||||
|
if n >= threshold {
|
||||||
|
removeVotes(ctx, hashID)
|
||||||
|
|
||||||
|
from := engine.GetExecutingScriptHash()
|
||||||
|
params := []interface{}{from, user, amount}
|
||||||
|
|
||||||
transferred := engine.AppCall([]byte(tokenHash), "transfer", params).(bool)
|
transferred := engine.AppCall([]byte(tokenHash), "transfer", params).(bool)
|
||||||
if !transferred {
|
if !transferred {
|
||||||
panic("failed to transfer funds, aborting")
|
panic("cheque: failed to transfer funds, aborting")
|
||||||
}
|
}
|
||||||
|
|
||||||
putSerialized(ctx, "UsedVerifCheckList", c)
|
putSerialized(ctx, "UsedVerifCheckList", c)
|
||||||
|
runtime.Notify("Cheque", id, user, amount, lockAcc)
|
||||||
|
}
|
||||||
|
|
||||||
return true
|
return true
|
||||||
case "InnerRingUpdate":
|
case "InnerRingUpdate":
|
||||||
|
@ -387,41 +421,6 @@ func delSerializedIR(ctx storage.Context, key string, value []byte) bool {
|
||||||
runtime.Log("target element has not been removed")
|
runtime.Log("target element has not been removed")
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
func verifySignatures(irList []node, data []byte, message []byte, offset int) bool {
|
|
||||||
n := len(irList)
|
|
||||||
f := (n - 1) / 3
|
|
||||||
s := n - f
|
|
||||||
if s < 3 {
|
|
||||||
runtime.Log("not enough inner ring nodes for consensus")
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
used := [][]byte{}
|
|
||||||
count := 0
|
|
||||||
for count < s && offset < len(data) {
|
|
||||||
pubkey := data[offset : offset+33]
|
|
||||||
signature := data[offset+33 : offset+97]
|
|
||||||
if containsPub(irList, pubkey) {
|
|
||||||
if crypto.VerifySignature(message, signature, pubkey) {
|
|
||||||
count++
|
|
||||||
for i := 0; i < len(used); i++ {
|
|
||||||
if util.Equals(used[i], pubkey) {
|
|
||||||
panic("duplicate public keys")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
used = append(used, pubkey)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
offset += 97
|
|
||||||
}
|
|
||||||
|
|
||||||
if count >= s {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
|
|
||||||
runtime.Log("not enough verified signatures")
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
// isInnerRingRequest returns true if contract was invoked by inner ring node.
|
// isInnerRingRequest returns true if contract was invoked by inner ring node.
|
||||||
func isInnerRingRequest(irList []node) bool {
|
func isInnerRingRequest(irList []node) bool {
|
||||||
|
|
Loading…
Reference in a new issue