-
Notifications
You must be signed in to change notification settings - Fork 42
/
msg_server_approve_disable_validator.go
89 lines (73 loc) · 3.14 KB
/
msg_server_approve_disable_validator.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
package keeper
import (
"context"
sdk "github.com/cosmos/cosmos-sdk/types"
sdkerrors "github.com/cosmos/cosmos-sdk/types/errors"
"github.com/zigbee-alliance/distributed-compliance-ledger/x/validator/types"
)
func (k msgServer) ApproveDisableValidator(goCtx context.Context, msg *types.MsgApproveDisableValidator) (*types.MsgApproveDisableValidatorResponse, error) {
ctx := sdk.UnwrapSDKContext(goCtx)
creatorAddr, err := sdk.AccAddressFromBech32(msg.Creator)
if err != nil {
return nil, sdkerrors.Wrapf(sdkerrors.ErrInvalidAddress, "Invalid creator address: (%s)", err)
}
validatorAddr, err := sdk.ValAddressFromBech32(msg.Address)
if err != nil {
return nil, sdkerrors.Wrapf(sdkerrors.ErrInvalidAddress, "Invalid validator address: (%s)", err)
}
// check if message creator has enough rights to approve disable validator
if !k.dclauthKeeper.HasRole(ctx, creatorAddr, types.VoteForDisableValidatorRole) {
return nil, sdkerrors.Wrapf(sdkerrors.ErrUnauthorized,
"MsgApproveDisableValidator transaction should be signed by an account with the %s role",
types.VoteForDisableValidatorRole,
)
}
// check if proposed disable validator exists
proposedDisableValidator, isFound := k.GetProposedDisableValidator(ctx, validatorAddr.String())
if !isFound {
return nil, types.NewErrProposedDisableValidatorDoesNotExist(msg.Address)
}
// check if disable validator already has approval form message creator
if proposedDisableValidator.HasApprovalFrom(creatorAddr) {
return nil, sdkerrors.Wrapf(sdkerrors.ErrUnauthorized,
"Disabled validator with address=%v already has approval from=%v",
msg.Address, msg.Creator,
)
}
// append approval
grant := types.Grant{
Address: creatorAddr.String(),
Time: msg.Time,
Info: msg.Info,
}
// check if disable validator already has reject from message creator
if proposedDisableValidator.HasRejectDisableFrom(creatorAddr) {
for i, other := range proposedDisableValidator.Rejects {
if other.Address == grant.Address {
proposedDisableValidator.Rejects = append(proposedDisableValidator.Rejects[:i], proposedDisableValidator.Rejects[i+1:]...)
break
}
}
}
proposedDisableValidator.Approvals = append(proposedDisableValidator.Approvals, &grant)
// check if proposed disable validator has enough approvals
if len(proposedDisableValidator.Approvals) >= k.DisableValidatorApprovalsCount(ctx) {
// remove disable validator
k.RemoveProposedDisableValidator(ctx, proposedDisableValidator.Address)
approvedDisableValidator := types.DisabledValidator{
Address: proposedDisableValidator.Address,
Creator: proposedDisableValidator.Creator,
Approvals: proposedDisableValidator.Approvals,
Rejects: proposedDisableValidator.Rejects,
DisabledByNodeAdmin: false,
}
// Disable validator
validator, _ := k.GetValidator(ctx, validatorAddr)
k.Jail(ctx, validator, proposedDisableValidator.Approvals[0].Info)
k.SetDisabledValidator(ctx, approvedDisableValidator)
} else {
// update proposed disable validator
k.SetProposedDisableValidator(ctx, proposedDisableValidator)
}
return &types.MsgApproveDisableValidatorResponse{}, nil
}