-
Notifications
You must be signed in to change notification settings - Fork 3.8k
Commits on Aug 1, 2017
-
Remove the changes around moving authorizations from Message to Transaction, as we decided this is not the best way to go. See details at #2 (comment)
Configuration menu - View commit details
-
Copy full SHA for eaef8b1 - Browse repository at this point
Copy the full SHA eaef8b1View commit details
Commits on Aug 8, 2017
-
Configuration menu - View commit details
-
Copy full SHA for 824bea0 - Browse repository at this point
Copy the full SHA 824bea0View commit details -
1) add default command - help 2) prevent segfault
Configuration menu - View commit details
-
Copy full SHA for 8b1fbf7 - Browse repository at this point
Copy the full SHA 8b1fbf7View commit details -
Configuration menu - View commit details
-
Copy full SHA for f30ccb0 - Browse repository at this point
Copy the full SHA f30ccb0View commit details -
Configuration menu - View commit details
-
Copy full SHA for aa057cc - Browse repository at this point
Copy the full SHA aa057ccView commit details -
Configuration menu - View commit details
-
Copy full SHA for 4592631 - Browse repository at this point
Copy the full SHA 4592631View commit details -
Configuration menu - View commit details
-
Copy full SHA for 9b98190 - Browse repository at this point
Copy the full SHA 9b98190View commit details -
We now check authorization of transactions when they come in as pending, and again when we apply them in some block (either when generating the block or when applying it). When applying the transactions in a block, we check auth for all transactions in the block prior to processing any. To check auth, we first scan all of the declared authorizations, and check that the authorization is sufficient to grant permission for the given account to execute the given message type (TODO: look up the actual required permission level rather than just assuming it's 'active'); then, check that the transaction bears signatures to confer the declared authorization.
Configuration menu - View commit details
-
Copy full SHA for 9ad3260 - Browse repository at this point
Copy the full SHA 9ad3260View commit details -
Ref #7: Implement require_authorization, fix tests
Require_authorization is now implemented so as the contract executes and asserts that a particular account approved the transaction, the chain asserts that this is so and throws if not. Also, update the tests, since the auth checks now bring to bear the rule that an account cannot be used in the same block that creates it. The tests now comply with this rule. TODO: - Check that all declared authorizations get required by the contract - Implement the mapping from user permissions to message types - Use mapping of permission to message type in lookup_minimum_permission
Configuration menu - View commit details
-
Copy full SHA for 0393f95 - Browse repository at this point
Copy the full SHA 0393f95View commit details -
Configuration menu - View commit details
-
Copy full SHA for ec03f1f - Browse repository at this point
Copy the full SHA ec03f1fView commit details -
Define the types documented in the issue. TODO: Implement logic
Configuration menu - View commit details
-
Copy full SHA for 94fc433 - Browse repository at this point
Copy the full SHA 94fc433View commit details -
Ref #123: Implement lookup_minimum_permission
Add docs on some of the types, register the index, and implement chain_controller::lookup_minimum_permission.
Configuration menu - View commit details
-
Copy full SHA for e4f3979 - Browse repository at this point
Copy the full SHA e4f3979View commit details -
Ref #123: Rename requirepermission->linkauth
The name requirepermission was too long, so I renamed it linkauth
Configuration menu - View commit details
-
Copy full SHA for 05550b8 - Browse repository at this point
Copy the full SHA 05550b8View commit details -
Implement the linkauth handler in the system contract
Configuration menu - View commit details
-
Copy full SHA for 8c5a0e7 - Browse repository at this point
Copy the full SHA 8c5a0e7View commit details -
Ref #123: Define/Implement unlinkauth
Add an unlinkauth message type which removes a link from a message type to a required authority
Configuration menu - View commit details
-
Copy full SHA for 12dcd35 - Browse repository at this point
Copy the full SHA 12dcd35View commit details -
Add satisfiability check to validate(Authority)
Add a check to the validate function on authority which checks that the authority can be satisfied, which is to say, that the total of all the weights meets or exceeds the threshold.
Configuration menu - View commit details
-
Copy full SHA for d78f1a6 - Browse repository at this point
Copy the full SHA d78f1a6View commit details -
Configuration menu - View commit details
-
Copy full SHA for fbff3c3 - Browse repository at this point
Copy the full SHA fbff3c3View commit details -
Add Complex_Authority test macro
Add a new testing helper macro, Complex_Authority, to create an arbitrary Authority inline with a slightly less confusing syntax
Configuration menu - View commit details
-
Copy full SHA for d15ce5e - Browse repository at this point
Copy the full SHA d15ce5eView commit details -
Ref #123: Test macros to set/delete auths
Create and smoke test Add_Authority and Delete_Authority test helper macros
Configuration menu - View commit details
-
Copy full SHA for d6f89ca - Browse repository at this point
Copy the full SHA d6f89caView commit details -
Configuration menu - View commit details
-
Copy full SHA for d4989d4 - Browse repository at this point
Copy the full SHA d4989d4View commit details -
Ref #123: Testing, fixing, 1 behavior change
The behavior change is that I am forbidding changing a permission_object's parent until we come up with a safe way to support it. The issue is that it's possible to create loops by creating an object A with an existing parent B, then setting B's parent to A. The obvious solution is to ensure with every parent change that there is a path back to the owner authority by following parents, but to do this we need a tree depth limit. I haven't explored the implications of that, so I'm just disabling parent changes for the time being. The user can simply delete the old subtree and create a new one if he wants to move a subtree from one parent to another.
Configuration menu - View commit details
-
Copy full SHA for 6218ccb - Browse repository at this point
Copy the full SHA 6218ccbView commit details -
Configuration menu - View commit details
-
Copy full SHA for a210f9c - Browse repository at this point
Copy the full SHA a210f9cView commit details -
Configuration menu - View commit details
-
Copy full SHA for 4adbf0b - Browse repository at this point
Copy the full SHA 4adbf0bView commit details -
Configuration menu - View commit details
-
Copy full SHA for fab1fcb - Browse repository at this point
Copy the full SHA fab1fcbView commit details -
Configuration menu - View commit details
-
Copy full SHA for 8d0b97f - Browse repository at this point
Copy the full SHA 8d0b97fView commit details -
Configuration menu - View commit details
-
Copy full SHA for 0ec8c9d - Browse repository at this point
Copy the full SHA 0ec8c9dView commit details -
Configuration menu - View commit details
-
Copy full SHA for 806508a - Browse repository at this point
Copy the full SHA 806508aView commit details -
Ref #123: Add test macros, testing, and fixing
Add macros for Link_Authority and Unlink_Authority, write some initial tests of these operations, and fix a bug (unlinkauth didn't require any authority)
Configuration menu - View commit details
-
Copy full SHA for 35c4740 - Browse repository at this point
Copy the full SHA 35c4740View commit details
Commits on Aug 9, 2017
-
When rejecting a transaction due to excessive authorizations on a message, include the authorizations which were not necessary in the reported error
Configuration menu - View commit details
-
Copy full SHA for f7c6021 - Browse repository at this point
Copy the full SHA f7c6021View commit details