java.lang.Comparable<Permission>
, net.sergeych.biserializer.BiSerializable
public class RevokePermission extends Permission
params
Constructor | Description |
---|---|
RevokePermission(Role role) |
Create new permission for revoke contract.
|
Modifier and Type | Method | Description |
---|---|---|
void |
checkChangesQuantized(Contract contract,
Contract changed,
java.util.Map<java.lang.String,net.sergeych.diff.Delta> stateChanges,
java.util.Set<Contract> revokingItems,
java.util.Collection<com.icodici.crypto.PublicKey> keys) |
Process changes of the contract.
|
checkChanges, compareTo, deserialize, equals, forName, getId, getName, getParams, getRole, isAllowedFor, isAllowedForKeys, isAllowedForKeys, isAllowedForKeysQuantized, isAllowedForKeysQuantized, isAllowedForQuantized, serialize, setId, toString
public RevokePermission(Role role)
role
- allows to permissionpublic void checkChangesQuantized(Contract contract, Contract changed, java.util.Map<java.lang.String,net.sergeych.diff.Delta> stateChanges, java.util.Set<Contract> revokingItems, java.util.Collection<com.icodici.crypto.PublicKey> keys) throws Quantiser.QuantiserException
Permission
Contract.addError(Errors, String)
for all relevant but
inappropriate changes.
IMPORTANT NOTE. Implementations usually should not add errors to the contract unless the permission can be used only once in any contract, such as change_owher or revoke. In all other cases, when the permission could be specified several times for different roles and with different parameter, implementation should do nothing on the error and let others porceed. Unprocessed changes will cause error if no permission will clear it.
checkChangesQuantized
in class Permission
contract
- source (valid) contractchanged
- is contract for checkingstateChanges
- map of changes, see Delta
for detailsrevokingItems
- items to be revoked. The ones are getting joined will be removed during checkkeys
- keys contract is sealed with. Keys are used to check other contracts permissionsQuantiser.QuantiserException