@@ -20,7 +20,7 @@ import (
2020 token2 "github.com/hyperledger-labs/fabric-token-sdk/token/token"
2121)
2222
23- type Conversion struct {
23+ type TokensUpgrade struct {
2424 // TMSID the token management service identifier
2525 TMSID token.TMSID
2626 // Wallet of the recipient of the cash to be issued
@@ -35,15 +35,15 @@ type Conversion struct {
3535 NotAnonymous bool
3636}
3737
38- type ConversionInitiatorView struct {
39- * Conversion
38+ type TokensUpgradeInitiatorView struct {
39+ * TokensUpgrade
4040}
4141
42- func (i * ConversionInitiatorView ) Call (context view.Context ) (interface {}, error ) {
43- span := context .StartSpan ("conversion_initiator_view " )
42+ func (i * TokensUpgradeInitiatorView ) Call (context view.Context ) (interface {}, error ) {
43+ span := context .StartSpan ("upgrade_initiator_view " )
4444 defer span .End ()
4545
46- // First, the initiator selects the tokens to convert , namely those that cannot be spent .
46+ // First, the initiator selects the tokens to upgrade , namely those that are unsupported .
4747 tms := token .GetManagementService (context , token .WithTMSID (i .TMSID ))
4848 assert .NotNil (tms , "failed getting token management service for [%s]" , i .TMSID )
4949 w := tms .WalletManager ().OwnerWallet (i .Wallet )
@@ -59,17 +59,17 @@ func (i *ConversionInitiatorView) Call(context view.Context) (interface{}, error
5959 unspendableTokens , err := collections .ReadAll (it )
6060 assert .NoError (err , "failed getting tokens" )
6161
62- // Then, the initiator sends a conversion request to the issuer.
62+ // Then, the initiator sends a upgrade request to the issuer.
6363 // If the initiator has already some recipient data, it uses that directly
6464 var id view.Identity
6565 var session view.Session
6666 if i .RecipientData != nil {
6767 // Use the passed RecipientData.
6868 // First register it locally
6969 assert .NoError (w .RegisterRecipient (i .RecipientData ), "failed to register remote recipient" )
70- // Then request conversion
71- span .AddEvent ("request_conversion_for_recipient " )
72- id , session , err = ttx .RequestConversionForRecipient (
70+ // Then request upgrade
71+ span .AddEvent ("request_upgrade_for_recipient " )
72+ id , session , err = ttx .RequestTokensUpgradeForRecipient (
7373 context ,
7474 view .Identity (i .Issuer ),
7575 i .Wallet ,
@@ -79,8 +79,8 @@ func (i *ConversionInitiatorView) Call(context view.Context) (interface{}, error
7979 token .WithTMSID (tms .ID ()),
8080 )
8181 } else {
82- span .AddEvent ("request_conversion " )
83- id , session , err = ttx .RequestConversion (
82+ span .AddEvent ("request_upgrade " )
83+ id , session , err = ttx .RequestTokensUpgrade (
8484 context ,
8585 view .Identity (i .Issuer ),
8686 i .Wallet ,
@@ -89,16 +89,16 @@ func (i *ConversionInitiatorView) Call(context view.Context) (interface{}, error
8989 token .WithTMSID (tms .ID ()),
9090 )
9191 }
92- assert .NoError (err , "failed to send conversion request" )
92+ assert .NoError (err , "failed to send upgrade request" )
9393
94- // Request conversion
94+ // Request upgrade
9595
9696 // At this point we have an inversion of roles.
9797 // The initiator becomes a responder.
9898 // This is a trick to the reuse the same API independently of the role a party plays.
9999 return context .RunView (nil , view .AsResponder (session ), view .WithViewCall (
100100 func (context view.Context ) (interface {}, error ) {
101- span := context .StartSpan ("conversion_respond_view " )
101+ span := context .StartSpan ("upgrade_respond_view " )
102102 defer span .End ()
103103 // At some point, the recipient receives the token transaction that in the meantime has been assembled
104104 tx , err := ttx .ReceiveTransaction (context )
@@ -118,7 +118,7 @@ func (i *ConversionInitiatorView) Call(context view.Context) (interface{}, error
118118 // If everything is fine, the recipient accepts and sends back her signature.
119119 // Notice that, a signature from the recipient might or might not be required to make the transaction valid.
120120 // This depends on the driver implementation.
121- span .AddEvent ("accept_conversion " )
121+ span .AddEvent ("accept_upgrade " )
122122 _ , err = context .RunView (ttx .NewAcceptView (tx ))
123123 assert .NoError (err , "failed to accept new tokens" )
124124
@@ -132,26 +132,26 @@ func (i *ConversionInitiatorView) Call(context view.Context) (interface{}, error
132132 ))
133133}
134134
135- type ConversionInitiatorViewFactory struct {}
135+ type TokensUpgradeInitiatorViewFactory struct {}
136136
137- func (p * ConversionInitiatorViewFactory ) NewView (in []byte ) (view.View , error ) {
138- f := & ConversionInitiatorView { Conversion : & Conversion {}}
139- err := json .Unmarshal (in , f .Conversion )
137+ func (p * TokensUpgradeInitiatorViewFactory ) NewView (in []byte ) (view.View , error ) {
138+ f := & TokensUpgradeInitiatorView { TokensUpgrade : & TokensUpgrade {}}
139+ err := json .Unmarshal (in , f .TokensUpgrade )
140140 assert .NoError (err , "failed unmarshalling input" )
141141
142142 return f , nil
143143}
144144
145- type ConversionResponderView struct {
145+ type TokensUpgradeResponderView struct {
146146 Auditor string
147147}
148148
149- func (p * ConversionResponderView ) Call (context view.Context ) (interface {}, error ) {
150- span := context .StartSpan ("conversion_responder_view " )
149+ func (p * TokensUpgradeResponderView ) Call (context view.Context ) (interface {}, error ) {
150+ span := context .StartSpan ("upgrade_responder_view " )
151151 defer span .End ()
152- // First the issuer receives the conversion request
153- conversionRequest , err := ttx .ReceiveConversionRequest (context )
154- assert .NoError (err , "failed to receive conversion request" )
152+ // First the issuer receives the upgrade request
153+ upgradeRequest , err := ttx .ReceiveTokensUpgradeRequest (context )
154+ assert .NoError (err , "failed to receive upgrade request" )
155155
156156 // Now we have an inversion of roles. The issuer becomes an initiator.
157157 // This is a trick to reuse the code used in IssueCashView
@@ -160,7 +160,7 @@ func (p *ConversionResponderView) Call(context view.Context) (interface{}, error
160160 // In this example, if the token type is USD, the issuer checks that no more than 230 units of USD
161161 // have been issued already including the current request.
162162 // No check is performed for other types.
163- wallet := token .GetManagementService (context , token .WithTMSID (conversionRequest .TMSID )).WalletManager ().IssuerWallet ("" )
163+ wallet := token .GetManagementService (context , token .WithTMSID (upgradeRequest .TMSID )).WalletManager ().IssuerWallet ("" )
164164 assert .NotNil (wallet , "issuer wallet not found" )
165165
166166 // At this point, the issuer is ready to prepare the token transaction.
@@ -173,21 +173,21 @@ func (p *ConversionResponderView) Call(context view.Context) (interface{}, error
173173 auditorID = p .Auditor
174174 }
175175 auditor := view2 .GetIdentityProvider (context ).Identity (auditorID )
176- if ! conversionRequest .NotAnonymous {
176+ if ! upgradeRequest .NotAnonymous {
177177 // The issuer creates an anonymous transaction (for Fabric, this means that the resulting transaction will be signed using idemix),
178- tx , err = ttx .NewAnonymousTransaction (context , ttx .WithAuditor (auditor ), ttx .WithTMSID (conversionRequest .TMSID ))
178+ tx , err = ttx .NewAnonymousTransaction (context , ttx .WithAuditor (auditor ), ttx .WithTMSID (upgradeRequest .TMSID ))
179179 } else {
180180 // The issuer creates a nominal transaction using the default identity
181- tx , err = ttx .NewTransaction (context , nil , ttx .WithAuditor (auditor ), ttx .WithTMSID (conversionRequest .TMSID ))
181+ tx , err = ttx .NewTransaction (context , nil , ttx .WithAuditor (auditor ), ttx .WithTMSID (upgradeRequest .TMSID ))
182182 }
183183 assert .NoError (err , "failed creating issue transaction" )
184184
185185 // The issuer adds a new issue operation to the transaction following the instruction received
186- err = tx .Convert (
186+ err = tx .Upgrade (
187187 wallet ,
188- conversionRequest .RecipientData .Identity ,
189- conversionRequest .Tokens ,
190- conversionRequest .Proof ,
188+ upgradeRequest .RecipientData .Identity ,
189+ upgradeRequest .Tokens ,
190+ upgradeRequest .Proof ,
191191 )
192192 assert .NoError (err , "failed adding new issued token" )
193193
0 commit comments