forked from cerc-io/laconicd
Prathamesh Musale
43b675cc0a
Part of cerc-io/laconic2d#38 This is a hot fix for the issue, cause yet to be investigated. Reviewed-on: cerc-io/laconic2d#39 Co-authored-by: Prathamesh Musale <prathamesh.musale0@gmail.com> Co-committed-by: Prathamesh Musale <prathamesh.musale0@gmail.com>
644 lines
18 KiB
Go
644 lines
18 KiB
Go
package keeper
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"net/url"
|
|
"strings"
|
|
"time"
|
|
|
|
"cosmossdk.io/collections"
|
|
errorsmod "cosmossdk.io/errors"
|
|
cryptotypes "github.com/cosmos/cosmos-sdk/crypto/types"
|
|
sdk "github.com/cosmos/cosmos-sdk/types"
|
|
sdkerrors "github.com/cosmos/cosmos-sdk/types/errors"
|
|
|
|
auctiontypes "git.vdb.to/cerc-io/laconicd/x/auction"
|
|
registrytypes "git.vdb.to/cerc-io/laconicd/x/registry"
|
|
"git.vdb.to/cerc-io/laconicd/x/registry/helpers"
|
|
)
|
|
|
|
// HasNameAuthority - checks if a name/authority exists.
|
|
func (k Keeper) HasNameAuthority(ctx sdk.Context, name string) (bool, error) {
|
|
has, err := k.Authorities.Has(ctx, name)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
return has, nil
|
|
}
|
|
|
|
// GetNameAuthority - gets a name authority from the store.
|
|
func (k Keeper) GetNameAuthority(ctx sdk.Context, name string) (registrytypes.NameAuthority, error) {
|
|
authority, err := k.Authorities.Get(ctx, name)
|
|
if err != nil {
|
|
if errors.Is(err, collections.ErrNotFound) {
|
|
return registrytypes.NameAuthority{}, errorsmod.Wrap(sdkerrors.ErrInvalidRequest, "Name authority not found.")
|
|
}
|
|
return registrytypes.NameAuthority{}, err
|
|
}
|
|
|
|
return authority, nil
|
|
}
|
|
|
|
// ListNameAuthorityRecords - get all name authority records.
|
|
func (k Keeper) ListNameAuthorityRecords(ctx sdk.Context) (map[string]registrytypes.NameAuthority, error) {
|
|
nameAuthorityRecords := make(map[string]registrytypes.NameAuthority)
|
|
|
|
err := k.Authorities.Walk(ctx, nil, func(key string, value registrytypes.NameAuthority) (bool, error) {
|
|
nameAuthorityRecords[key] = value
|
|
return false, nil
|
|
})
|
|
if err != nil {
|
|
return map[string]registrytypes.NameAuthority{}, err
|
|
}
|
|
|
|
return nameAuthorityRecords, nil
|
|
}
|
|
|
|
// HasNameRecord - checks if a name record exists.
|
|
func (k Keeper) HasNameRecord(ctx sdk.Context, lrn string) (bool, error) {
|
|
return k.NameRecords.Has(ctx, lrn)
|
|
}
|
|
|
|
// GetNameRecord - gets a name record from the store.
|
|
func (k Keeper) GetNameRecord(ctx sdk.Context, lrn string) (*registrytypes.NameRecord, error) {
|
|
nameRecord, err := k.NameRecords.Get(ctx, lrn)
|
|
if err != nil {
|
|
if errors.Is(err, collections.ErrNotFound) {
|
|
return nil, nil
|
|
}
|
|
return nil, err
|
|
}
|
|
|
|
return &nameRecord, nil
|
|
}
|
|
|
|
// LookupNameRecord - gets a name record which is not stale and under active authority.
|
|
func (k Keeper) LookupNameRecord(ctx sdk.Context, lrn string) (*registrytypes.NameRecord, error) {
|
|
_, _, authority, err := k.getAuthority(ctx, lrn)
|
|
if err != nil || authority.Status != registrytypes.AuthorityActive {
|
|
// If authority is not active (or any other error), lookup fails.
|
|
return nil, nil
|
|
}
|
|
|
|
nameRecord, err := k.GetNameRecord(ctx, lrn)
|
|
|
|
// Name record may not exist.
|
|
if nameRecord == nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Name lookup should fail if the name record is stale.
|
|
// i.e. authority was registered later than the name.
|
|
if authority.Height > nameRecord.Latest.Height {
|
|
return nil, nil
|
|
}
|
|
|
|
return nameRecord, nil
|
|
}
|
|
|
|
// ListNameRecords - get all name records.
|
|
func (k Keeper) ListNameRecords(ctx sdk.Context) ([]registrytypes.NameEntry, error) {
|
|
var nameEntries []registrytypes.NameEntry
|
|
|
|
err := k.NameRecords.Walk(ctx, nil, func(key string, value registrytypes.NameRecord) (stop bool, err error) {
|
|
nameEntries = append(nameEntries, registrytypes.NameEntry{
|
|
Name: key,
|
|
Entry: &value,
|
|
})
|
|
|
|
return false, nil
|
|
})
|
|
|
|
return nameEntries, err
|
|
}
|
|
|
|
// SaveNameRecord - sets a name record.
|
|
func (k Keeper) SaveNameRecord(ctx sdk.Context, lrn string, id string) error {
|
|
var nameRecord registrytypes.NameRecord
|
|
existingNameRecord, err := k.GetNameRecord(ctx, lrn)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if existingNameRecord != nil {
|
|
nameRecord = *existingNameRecord
|
|
nameRecord.History = append(nameRecord.History, nameRecord.Latest)
|
|
}
|
|
|
|
nameRecord.Latest = ®istrytypes.NameRecordEntry{
|
|
Id: id,
|
|
Height: uint64(ctx.BlockHeight()),
|
|
}
|
|
|
|
return k.NameRecords.Set(ctx, lrn, nameRecord)
|
|
}
|
|
|
|
// SetName creates a LRN -> Record ID mapping.
|
|
func (k Keeper) SetName(ctx sdk.Context, msg registrytypes.MsgSetName) error {
|
|
signerAddress, err := sdk.AccAddressFromBech32(msg.Signer)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = k.checkLRNAccess(ctx, signerAddress, msg.Lrn)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
nameRecord, err := k.LookupNameRecord(ctx, msg.Lrn)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if nameRecord != nil && nameRecord.Latest.Id == msg.Cid {
|
|
return nil
|
|
}
|
|
|
|
return k.SaveNameRecord(ctx, msg.Lrn, msg.Cid)
|
|
}
|
|
|
|
// SaveNameAuthority creates the NameAuthority record.
|
|
func (k Keeper) SaveNameAuthority(ctx sdk.Context, name string, authority *registrytypes.NameAuthority) error {
|
|
return k.Authorities.Set(ctx, name, *authority)
|
|
}
|
|
|
|
// ReserveAuthority reserves a name authority.
|
|
func (k Keeper) ReserveAuthority(ctx sdk.Context, msg registrytypes.MsgReserveAuthority) error {
|
|
lrn := fmt.Sprintf("lrn://%s", msg.GetName())
|
|
parsedLrn, err := url.Parse(lrn)
|
|
if err != nil {
|
|
return errorsmod.Wrap(sdkerrors.ErrInvalidRequest, "Invalid name")
|
|
}
|
|
|
|
name := parsedLrn.Host
|
|
if fmt.Sprintf("lrn://%s", name) != lrn {
|
|
return errorsmod.Wrap(sdkerrors.ErrInvalidRequest, "Invalid name")
|
|
}
|
|
|
|
if strings.Contains(name, ".") {
|
|
return k.ReserveSubAuthority(ctx, name, msg)
|
|
}
|
|
|
|
err = k.createAuthority(ctx, name, msg.GetSigner(), true)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// ReserveSubAuthority reserves a sub-authority.
|
|
func (k Keeper) ReserveSubAuthority(ctx sdk.Context, name string, msg registrytypes.MsgReserveAuthority) error {
|
|
// Get parent authority name.
|
|
names := strings.Split(name, ".")
|
|
parent := strings.Join(names[1:], ".")
|
|
|
|
// Check if parent authority exists.
|
|
if has, err := k.HasNameAuthority(ctx, parent); !has {
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return errorsmod.Wrap(sdkerrors.ErrInvalidRequest, "Parent authority not found.")
|
|
}
|
|
parentAuthority, err := k.GetNameAuthority(ctx, parent)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Sub-authority creator needs to be the owner of the parent authority.
|
|
if parentAuthority.OwnerAddress != msg.Signer {
|
|
return errorsmod.Wrap(sdkerrors.ErrUnauthorized, "Access denied.")
|
|
}
|
|
|
|
// Sub-authority owner defaults to parent authority owner.
|
|
subAuthorityOwner := msg.Signer
|
|
if len(msg.Owner) != 0 {
|
|
// Override sub-authority owner if provided in message.
|
|
subAuthorityOwner = msg.Owner
|
|
}
|
|
|
|
sdkErr := k.createAuthority(ctx, name, subAuthorityOwner, false)
|
|
if sdkErr != nil {
|
|
return sdkErr
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (k Keeper) createAuthority(ctx sdk.Context, name string, owner string, isRoot bool) error {
|
|
moduleParams, err := k.GetParams(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
has, err := k.HasNameAuthority(ctx, name)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if has {
|
|
authority, err := k.GetNameAuthority(ctx, name)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if authority.Status != registrytypes.AuthorityExpired {
|
|
return errorsmod.Wrap(sdkerrors.ErrInvalidRequest, "Name already reserved.")
|
|
}
|
|
}
|
|
|
|
ownerAddress, err := sdk.AccAddressFromBech32(owner)
|
|
if err != nil {
|
|
return errorsmod.Wrap(sdkerrors.ErrInvalidRequest, "Invalid owner address.")
|
|
}
|
|
ownerAccount := k.accountKeeper.GetAccount(ctx, ownerAddress)
|
|
if ownerAccount == nil {
|
|
return errorsmod.Wrap(sdkerrors.ErrUnknownAddress, "Owner account not found.")
|
|
}
|
|
|
|
authority := registrytypes.NameAuthority{
|
|
OwnerPublicKey: getAuthorityPubKey(ownerAccount.GetPubKey()),
|
|
OwnerAddress: owner,
|
|
Height: uint64(ctx.BlockHeight()),
|
|
Status: registrytypes.AuthorityActive,
|
|
AuctionId: "",
|
|
BondId: "",
|
|
ExpiryTime: ctx.BlockTime().Add(moduleParams.AuthorityGracePeriod),
|
|
}
|
|
|
|
if isRoot && moduleParams.AuthorityAuctionEnabled {
|
|
// If auctions are enabled, clear out owner fields. They will be set after a winner is picked.
|
|
authority.OwnerAddress = ""
|
|
authority.OwnerPublicKey = ""
|
|
|
|
// Reset bond ID if required.
|
|
authority.BondId = ""
|
|
|
|
params := auctiontypes.Params{
|
|
CommitsDuration: moduleParams.AuthorityAuctionCommitsDuration,
|
|
RevealsDuration: moduleParams.AuthorityAuctionRevealsDuration,
|
|
CommitFee: moduleParams.AuthorityAuctionCommitFee,
|
|
RevealFee: moduleParams.AuthorityAuctionRevealFee,
|
|
MinimumBid: moduleParams.AuthorityAuctionMinimumBid,
|
|
}
|
|
|
|
// Create an auction.
|
|
msg := auctiontypes.NewMsgCreateAuction(params, ownerAddress)
|
|
|
|
auction, sdkErr := k.auctionKeeper.CreateAuction(ctx, msg)
|
|
if sdkErr != nil {
|
|
return sdkErr
|
|
}
|
|
|
|
authority.Status = registrytypes.AuthorityUnderAuction
|
|
authority.AuctionId = auction.Id
|
|
authority.ExpiryTime = auction.RevealsEndTime.Add(moduleParams.AuthorityGracePeriod)
|
|
}
|
|
|
|
// Save name authority in store.
|
|
if err = k.SaveNameAuthority(ctx, name, &authority); err != nil {
|
|
return err
|
|
}
|
|
|
|
return k.insertAuthorityExpiryQueue(ctx, name, authority.ExpiryTime)
|
|
}
|
|
|
|
func (k Keeper) SetAuthorityBond(ctx sdk.Context, msg registrytypes.MsgSetAuthorityBond) error {
|
|
name := msg.GetName()
|
|
signer := msg.GetSigner()
|
|
|
|
if has, err := k.HasNameAuthority(ctx, name); !has {
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return errorsmod.Wrap(sdkerrors.ErrInvalidRequest, "Name authority not found.")
|
|
}
|
|
|
|
authority, err := k.GetNameAuthority(ctx, name)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if authority.OwnerAddress != signer {
|
|
return errorsmod.Wrap(sdkerrors.ErrUnauthorized, "Access denied.")
|
|
}
|
|
|
|
if has, err := k.bondKeeper.HasBond(ctx, msg.BondId); !has {
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return errorsmod.Wrap(sdkerrors.ErrInvalidRequest, "Bond not found.")
|
|
}
|
|
|
|
bond, err := k.bondKeeper.GetBondById(ctx, msg.BondId)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if bond.Owner != signer {
|
|
return errorsmod.Wrap(sdkerrors.ErrUnauthorized, "Bond owner mismatch.")
|
|
}
|
|
|
|
// No-op if bond hasn't changed.
|
|
if authority.BondId == msg.BondId {
|
|
return nil
|
|
}
|
|
|
|
// Update bond id and save name authority in store.
|
|
authority.BondId = bond.Id
|
|
if err = k.SaveNameAuthority(ctx, name, &authority); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// DeleteName removes a LRN -> Record ID mapping.
|
|
func (k Keeper) DeleteName(ctx sdk.Context, msg registrytypes.MsgDeleteName) error {
|
|
signerAddress, err := sdk.AccAddressFromBech32(msg.Signer)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = k.checkLRNAccess(ctx, signerAddress, msg.Lrn)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
lrnExists, err := k.HasNameRecord(ctx, msg.Lrn)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if !lrnExists {
|
|
return errorsmod.Wrap(sdkerrors.ErrInvalidRequest, "Name not found.")
|
|
}
|
|
|
|
// Set CID to empty string.
|
|
return k.SaveNameRecord(ctx, msg.Lrn, "")
|
|
}
|
|
|
|
// ResolveLRN resolves a LRN to a record.
|
|
func (k Keeper) ResolveLRN(ctx sdk.Context, lrn string) (*registrytypes.Record, error) {
|
|
_, _, authority, err := k.getAuthority(ctx, lrn)
|
|
if err != nil || authority.Status != registrytypes.AuthorityActive {
|
|
// If authority is not active (or any other error), resolution fails.
|
|
return nil, err
|
|
}
|
|
|
|
// Name should not resolve if it's stale.
|
|
// i.e. authority was registered later than the name.
|
|
record, nameRecord, err := k.resolveLRNRecord(ctx, lrn)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if authority.Height > nameRecord.Latest.Height {
|
|
return nil, nil
|
|
}
|
|
|
|
return record, nil
|
|
}
|
|
|
|
func (k Keeper) resolveLRNRecord(ctx sdk.Context, lrn string) (*registrytypes.Record, *registrytypes.NameRecord, error) {
|
|
nameRecord, err := k.GetNameRecord(ctx, lrn)
|
|
if nameRecord == nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
latestRecordId := nameRecord.Latest.Id
|
|
if latestRecordId == "" {
|
|
return nil, nameRecord, nil
|
|
}
|
|
|
|
if has, err := k.HasRecord(ctx, latestRecordId); !has {
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
return nil, nameRecord, nil
|
|
}
|
|
|
|
record, err := k.GetRecordById(ctx, latestRecordId)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
return &record, nameRecord, nil
|
|
}
|
|
|
|
func (k Keeper) getAuthority(ctx sdk.Context, lrn string) (string, *url.URL, *registrytypes.NameAuthority, error) {
|
|
parsedLRN, err := url.Parse(lrn)
|
|
if err != nil {
|
|
return "", nil, nil, errorsmod.Wrap(sdkerrors.ErrInvalidRequest, "Invalid LRN.")
|
|
}
|
|
|
|
name := parsedLRN.Host
|
|
if has, err := k.HasNameAuthority(ctx, name); !has {
|
|
if err != nil {
|
|
return "", nil, nil, err
|
|
}
|
|
|
|
return "", nil, nil, errorsmod.Wrap(sdkerrors.ErrInvalidRequest, "Name authority not found.")
|
|
}
|
|
|
|
authority, err := k.GetNameAuthority(ctx, name)
|
|
if err != nil {
|
|
return "", nil, nil, err
|
|
}
|
|
|
|
return name, parsedLRN, &authority, nil
|
|
}
|
|
|
|
func (k Keeper) checkLRNAccess(ctx sdk.Context, signer sdk.AccAddress, lrn string) error {
|
|
name, parsedLRN, authority, err := k.getAuthority(ctx, lrn)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
formattedLRN := fmt.Sprintf("lrn://%s%s", name, parsedLRN.RequestURI())
|
|
if formattedLRN != lrn {
|
|
return errorsmod.Wrap(sdkerrors.ErrInvalidRequest, "Invalid LRN.")
|
|
}
|
|
|
|
if authority.OwnerAddress != signer.String() {
|
|
return errorsmod.Wrap(sdkerrors.ErrUnauthorized, "Access denied.")
|
|
}
|
|
|
|
if authority.Status != registrytypes.AuthorityActive {
|
|
return errorsmod.Wrap(sdkerrors.ErrUnauthorized, "Authority is not active.")
|
|
}
|
|
|
|
if authority.BondId == "" || len(authority.BondId) == 0 {
|
|
return errorsmod.Wrap(sdkerrors.ErrUnauthorized, "Authority bond not found.")
|
|
}
|
|
|
|
if authority.OwnerPublicKey == "" {
|
|
// Try to set owner public key if account has it available now.
|
|
ownerAccount := k.accountKeeper.GetAccount(ctx, signer)
|
|
pubKey := ownerAccount.GetPubKey()
|
|
if pubKey != nil {
|
|
// Update public key in authority record.
|
|
authority.OwnerPublicKey = getAuthorityPubKey(pubKey)
|
|
if err = k.SaveNameAuthority(ctx, name, authority); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// ProcessAuthorityExpiryQueue tries to renew expiring authorities (by collecting rent) else marks them as expired.
|
|
func (k Keeper) ProcessAuthorityExpiryQueue(ctx sdk.Context) error {
|
|
names, err := k.getAllExpiredAuthorities(ctx, ctx.BlockHeader().Time)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, name := range names {
|
|
authority, err := k.GetNameAuthority(ctx, name)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
bondExists := false
|
|
if authority.BondId != "" {
|
|
bondExists, err = k.bondKeeper.HasBond(ctx, authority.BondId)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
// If authority doesn't have an associated bond or if bond no longer exists, mark it expired.
|
|
if !bondExists {
|
|
authority.Status = registrytypes.AuthorityExpired
|
|
if err = k.SaveNameAuthority(ctx, name, &authority); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err = k.deleteAuthorityExpiryQueue(ctx, name, authority); err != nil {
|
|
return err
|
|
}
|
|
|
|
k.Logger(ctx).Info(fmt.Sprintf("Marking authority expired as no bond present: %s", name))
|
|
|
|
return nil
|
|
}
|
|
|
|
// Try to renew the authority by taking rent.
|
|
if err := k.tryTakeAuthorityRent(ctx, name, authority); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// getAllExpiredAuthorities returns a concatenated list of all the timeslices before currTime.
|
|
func (k Keeper) getAllExpiredAuthorities(ctx sdk.Context, currTime time.Time) ([]string, error) {
|
|
var expiredAuthorityNames []string
|
|
|
|
// Get all the authorities with expiry time until currTime
|
|
rng := new(collections.Range[time.Time]).EndInclusive(currTime)
|
|
err := k.AuthorityExpiryQueue.Walk(ctx, rng, func(key time.Time, value registrytypes.ExpiryQueue) (stop bool, err error) {
|
|
expiredAuthorityNames = append(expiredAuthorityNames, value.Value...)
|
|
return false, nil
|
|
})
|
|
if err != nil {
|
|
return []string{}, err
|
|
}
|
|
|
|
return expiredAuthorityNames, nil
|
|
}
|
|
|
|
func (k Keeper) insertAuthorityExpiryQueue(ctx sdk.Context, name string, expiryTime time.Time) error {
|
|
existingNamesList, err := k.AuthorityExpiryQueue.Get(ctx, expiryTime)
|
|
if err != nil {
|
|
if errors.Is(err, collections.ErrNotFound) {
|
|
existingNamesList = registrytypes.ExpiryQueue{
|
|
Id: expiryTime.String(),
|
|
Value: []string{},
|
|
}
|
|
} else {
|
|
return err
|
|
}
|
|
}
|
|
|
|
existingNamesList.Value = append(existingNamesList.Value, name)
|
|
return k.AuthorityExpiryQueue.Set(ctx, expiryTime, existingNamesList)
|
|
}
|
|
|
|
// deleteAuthorityExpiryQueue deletes an authority name from the authority expiry queue.
|
|
func (k Keeper) deleteAuthorityExpiryQueue(ctx sdk.Context, name string, authority registrytypes.NameAuthority) error {
|
|
expiryTime := authority.ExpiryTime
|
|
|
|
existingNamesList, err := k.AuthorityExpiryQueue.Get(ctx, expiryTime)
|
|
if err != nil {
|
|
if errors.Is(err, collections.ErrNotFound) {
|
|
return nil
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
newNamesSlice := []string{}
|
|
for _, id := range existingNamesList.Value {
|
|
if id != name {
|
|
newNamesSlice = append(newNamesSlice, id)
|
|
}
|
|
}
|
|
|
|
if len(existingNamesList.Value) == 0 {
|
|
return k.AuthorityExpiryQueue.Remove(ctx, expiryTime)
|
|
} else {
|
|
existingNamesList.Value = newNamesSlice
|
|
return k.AuthorityExpiryQueue.Set(ctx, expiryTime, existingNamesList)
|
|
}
|
|
}
|
|
|
|
// tryTakeAuthorityRent tries to take rent from the authority bond.
|
|
func (k Keeper) tryTakeAuthorityRent(ctx sdk.Context, name string, authority registrytypes.NameAuthority) error {
|
|
k.Logger(ctx).Info(fmt.Sprintf("Trying to take rent for authority: %s", name))
|
|
|
|
params, err := k.GetParams(ctx)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
rent := params.AuthorityRent
|
|
sdkErr := k.bondKeeper.TransferCoinsToModuleAccount(ctx, authority.BondId, registrytypes.AuthorityRentModuleAccountName, sdk.NewCoins(rent))
|
|
if sdkErr != nil {
|
|
// Insufficient funds, mark authority as expired.
|
|
authority.Status = registrytypes.AuthorityExpired
|
|
if err := k.SaveNameAuthority(ctx, name, &authority); err != nil {
|
|
return err
|
|
}
|
|
|
|
k.Logger(ctx).Info(fmt.Sprintf("Insufficient funds in owner account to pay authority rent, marking as expired: %s", name))
|
|
|
|
return k.deleteAuthorityExpiryQueue(ctx, name, authority)
|
|
}
|
|
|
|
// Delete old expiry queue entry, create new one.
|
|
if err := k.deleteAuthorityExpiryQueue(ctx, name, authority); err != nil {
|
|
return err
|
|
}
|
|
|
|
authority.ExpiryTime = ctx.BlockTime().Add(params.AuthorityRentDuration)
|
|
if err := k.insertAuthorityExpiryQueue(ctx, name, authority.ExpiryTime); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Save authority.
|
|
authority.Status = registrytypes.AuthorityActive
|
|
|
|
k.Logger(ctx).Info(fmt.Sprintf("Authority rent paid successfully: %s", name))
|
|
|
|
return k.SaveNameAuthority(ctx, name, &authority)
|
|
}
|
|
|
|
func getAuthorityPubKey(pubKey cryptotypes.PubKey) string {
|
|
if pubKey == nil {
|
|
return ""
|
|
}
|
|
|
|
return helpers.BytesToBase64(pubKey.Bytes())
|
|
}
|