-
Notifications
You must be signed in to change notification settings - Fork 64
/
Copy pathtransfer.go
196 lines (175 loc) · 6.25 KB
/
transfer.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
/*
Copyright IBM Corp. All Rights Reserved.
SPDX-License-Identifier: Apache-2.0
*/
package v1
import (
"context"
"github.com/hyperledger-labs/fabric-token-sdk/token/core/common"
"github.com/hyperledger-labs/fabric-token-sdk/token/core/common/meta"
"github.com/hyperledger-labs/fabric-token-sdk/token/core/fabtoken/v1/core"
"github.com/hyperledger-labs/fabric-token-sdk/token/driver"
"github.com/hyperledger-labs/fabric-token-sdk/token/services/logging"
"github.com/hyperledger-labs/fabric-token-sdk/token/token"
"github.com/pkg/errors"
)
type TransferService struct {
Logger logging.Logger
PublicParametersManager common.PublicParametersManager[*core.PublicParams]
WalletService driver.WalletService
TokenLoader TokenLoader
Deserializer driver.Deserializer
}
func NewTransferService(
logger logging.Logger,
publicParametersManager common.PublicParametersManager[*core.PublicParams],
walletService driver.WalletService,
tokenLoader TokenLoader,
deserializer driver.Deserializer,
) *TransferService {
return &TransferService{
Logger: logger,
PublicParametersManager: publicParametersManager,
WalletService: walletService,
TokenLoader: tokenLoader,
Deserializer: deserializer,
}
}
// Transfer returns a TransferAction as a function of the passed arguments
// It also returns the corresponding TransferMetadata
func (s *TransferService) Transfer(ctx context.Context, _ string, _ driver.OwnerWallet, tokenIDs []*token.ID, Outputs []*token.Token, issuerPublicKey []byte, opts *driver.TransferOptions) (driver.TransferAction, *driver.TransferMetadata, error) {
var isRedeem bool
// select inputs
inputTokens, err := s.TokenLoader.GetTokens(tokenIDs)
if err != nil {
return nil, nil, errors.Wrapf(err, "failed to load tokens")
}
var inputs []*core.Output
for _, tok := range inputTokens {
s.Logger.Debugf("Selected output [%s,%s,%s]", tok.Type, tok.Quantity, driver.Identity(tok.Owner))
t := core.Output(*tok)
inputs = append(inputs, &t)
}
// prepare outputs
var outs []*core.Output
for _, output := range Outputs {
outs = append(outs, &core.Output{
Owner: output.Owner,
Type: output.Type,
Quantity: output.Quantity,
})
if len(output.Owner) == 0 {
isRedeem = true
}
}
// assemble transfer transferMetadata
ws := s.WalletService
// inputs
transferInputsMetadata := make([]*driver.TransferInputMetadata, 0, len(inputTokens))
for i, t := range inputTokens {
auditInfo, err := s.Deserializer.GetAuditInfo(t.Owner, ws)
if err != nil {
return nil, nil, errors.Wrapf(err, "failed getting audit info for sender identity [%s]", driver.Identity(t.Owner).String())
}
transferInputsMetadata = append(transferInputsMetadata, &driver.TransferInputMetadata{
TokenID: tokenIDs[i],
Senders: []*driver.AuditableIdentity{
{
Identity: t.Owner,
AuditInfo: auditInfo,
},
},
})
}
// outputs
outputMetadata := &core.OutputMetadata{}
outputMetadataRaw, err := outputMetadata.Serialize()
if err != nil {
return nil, nil, errors.Wrapf(err, "failed serializing output information")
}
transferOutputsMetadata := make([]*driver.TransferOutputMetadata, 0, len(outs))
for _, output := range outs {
var outputAudiInfo []byte
var receivers []driver.Identity
var receiversAuditInfo [][]byte
var outputReceivers []*driver.AuditableIdentity
if len(output.Owner) == 0 { // redeem
outputAudiInfo = nil
receivers = append(receivers, output.Owner)
receiversAuditInfo = append(receiversAuditInfo, []byte{})
outputReceivers = make([]*driver.AuditableIdentity, 0, 1)
} else {
outputAudiInfo, err = s.Deserializer.GetAuditInfo(output.Owner, ws)
if err != nil {
return nil, nil, errors.Wrapf(err, "failed getting audit info for sender identity [%s]", driver.Identity(output.Owner).String())
}
recipients, err := s.Deserializer.Recipients(output.Owner)
if err != nil {
return nil, nil, errors.Wrap(err, "failed getting recipients")
}
receivers = append(receivers, recipients...)
for _, receiver := range receivers {
receiverAudiInfo, err := s.Deserializer.GetAuditInfo(receiver, ws)
if err != nil {
return nil, nil, errors.Wrapf(err, "failed getting audit info for receiver identity [%s]", receiver)
}
receiversAuditInfo = append(receiversAuditInfo, receiverAudiInfo)
}
outputReceivers = make([]*driver.AuditableIdentity, 0, len(recipients))
}
for i, receiver := range receivers {
outputReceivers = append(outputReceivers, &driver.AuditableIdentity{
Identity: receiver,
AuditInfo: receiversAuditInfo[i],
})
}
transferOutputsMetadata = append(transferOutputsMetadata, &driver.TransferOutputMetadata{
OutputMetadata: outputMetadataRaw,
OutputAuditInfo: outputAudiInfo,
Receivers: outputReceivers,
})
}
// return
transfer := &core.TransferAction{
Inputs: tokenIDs,
InputTokens: inputs,
Outputs: outs,
Metadata: meta.TransferActionMetadata(opts.Attributes),
ESigners: nil,
}
transferMetadata := &driver.TransferMetadata{
Inputs: transferInputsMetadata,
Outputs: transferOutputsMetadata,
ExtraSigners: nil,
}
// add redeem signer
if isRedeem {
var issuer driver.Identity
if issuerPublicKey != nil {
issuer = issuerPublicKey
} else {
issuers := s.PublicParametersManager.PublicParameters().Issuers()
if len(issuers) < 1 {
return nil, nil, errors.New("no issuer found")
}
issuer = issuers[0]
}
transfer.ESigners = []driver.Identity{issuer}
transferMetadata.ExtraSigners = []driver.Identity{issuer}
}
return transfer, transferMetadata, nil
}
// VerifyTransfer checks the outputs in the TransferAction against the passed tokenInfos
func (s *TransferService) VerifyTransfer(tr driver.TransferAction, outputMetadata []*driver.TransferOutputMetadata) error {
// TODO:
return nil
}
// DeserializeTransferAction un-marshals a TransferAction from the passed array of bytes.
// DeserializeTransferAction returns an error, if the un-marshalling fails.
func (s *TransferService) DeserializeTransferAction(raw []byte) (driver.TransferAction, error) {
t := &core.TransferAction{}
if err := t.Deserialize(raw); err != nil {
return nil, errors.Wrap(err, "failed deserializing transfer action")
}
return t, nil
}