Skip to content
This repository has been archived by the owner on May 16, 2024. It is now read-only.

Commit

Permalink
fix(scripts): example scripts recovered
Browse files Browse the repository at this point in the history
  • Loading branch information
yahortsaryk committed Jun 30, 2023
1 parent d8308d0 commit 8d2236b
Show file tree
Hide file tree
Showing 10 changed files with 3,604 additions and 1,953 deletions.
18 changes: 9 additions & 9 deletions bucket/ddc_bucket/cluster/messages.rs
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ use crate::ddc_bucket::ClusterNodeReplaced;
use crate::ddc_bucket::{
BASIS_POINTS,
AccountId, Balance, ClusterCreated, ClusterNodeAdded, ClusterNodeRemoved,
ClusterCdnNodeAdded, ClusterCdnNodeRemoved, ClusterDistributeRevenues, CdnClusterDistributeRevenues, ClusterReserveResource,
ClusterCdnNodeAdded, ClusterCdnNodeRemoved, ClusterDistributeRevenues, ClusterReserveResource, ClusterDistributeCdnRevenues,
ClusterRemoved, ClusterParamsSet, ClusterNodeStatusSet, ClusterCdnNodeStatusSet, PermissionGranted, PermissionRevoked,
DdcBucket, NodeStatusInCluster, Result, Error::*
};
Expand All @@ -39,7 +39,7 @@ impl DdcBucket {

Self::env().emit_event(ClusterCreated {
cluster_id,
manager: caller,
manager_id: caller,
cluster_params,
});

Expand Down Expand Up @@ -297,14 +297,14 @@ impl DdcBucket {

pub fn message_grant_trusted_manager_permission(
&mut self,
manager: AccountId
manager_id: AccountId
) -> Result<()> {
let grantor = Self::env().caller();
let permission = Permission::ClusterManagerTrustedBy(grantor);
self.grant_permission(manager, permission)?;
self.grant_permission(manager_id, permission)?;

Self::env().emit_event(PermissionGranted {
account_id: manager,
account_id: manager_id,
permission
});

Expand All @@ -314,14 +314,14 @@ impl DdcBucket {

pub fn message_revoke_trusted_manager_permission(
&mut self,
manager: AccountId
manager_id: AccountId
) -> Result<()> {
let grantor = Self::env().caller();
let permission = Permission::ClusterManagerTrustedBy(grantor);
self.revoke_permission(manager, permission)?;
self.revoke_permission(manager_id, permission)?;

Self::env().emit_event(PermissionRevoked {
account_id: manager,
account_id: manager_id,
permission
});

Expand Down Expand Up @@ -592,7 +592,7 @@ impl DdcBucket {
cdn_node.take_payment(cdn_node.undistributed_payment)?;
self.cdn_nodes.update(*cdn_node_key, &cdn_node)?;

Self::env().emit_event(CdnClusterDistributeRevenues {
Self::env().emit_event(ClusterDistributeCdnRevenues {
cluster_id,
provider_id: cdn_node.provider_id
});
Expand Down
3 changes: 1 addition & 2 deletions bucket/ddc_bucket/tests/env_utils.rs
Original file line number Diff line number Diff line change
Expand Up @@ -69,8 +69,7 @@ pub fn print_events(events: &[Event]) {
Event::Deposit(ev) => println!("EVENT {:?}", ev),
Event::PermissionGranted(ev) => println!("EVENT {:?}", ev),
Event::PermissionRevoked(ev) => println!("EVENT {:?}", ev),
Event::CdnClusterCreated(ev) => println!("EVENT {:?}", ev),
Event::CdnClusterDistributeRevenues(ev) => println!("EVENT {:?}", ev),
Event::ClusterDistributeCdnRevenues(ev) => println!("EVENT {:?}", ev),
Event::CdnNodeCreated(ev) => println!("EVENT {:?}", ev),
Event::ClusterNodeAdded(ev) => println!("EVENT {:?}", ev),
Event::ClusterCdnNodeAdded(ev) => println!("{:?}", ev),
Expand Down
2 changes: 1 addition & 1 deletion bucket/ddc_bucket/tests/test_cluster.rs
Original file line number Diff line number Diff line change
Expand Up @@ -188,7 +188,7 @@ fn cluster_create_ok() {
matches!(events.pop().unwrap(), Event::ClusterCreated(ev) if ev ==
ClusterCreated {
cluster_id: ctx.cluster_id,
manager: ctx.manager_id,
manager_id: ctx.manager_id,
cluster_params: ctx.cluster_params.clone()
})
);
Expand Down
47 changes: 16 additions & 31 deletions bucket/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -272,7 +272,7 @@ pub mod ddc_bucket {
#[ink(topic)]
cluster_id: ClusterId,
#[ink(topic)]
manager: AccountId,
manager_id: AccountId,
cluster_params: ClusterParams,
}

Expand Down Expand Up @@ -377,6 +377,15 @@ pub mod ddc_bucket {
provider_id: AccountId,
}

#[ink(event)]
#[cfg_attr(feature = "std", derive(PartialEq, Debug, scale_info::TypeInfo))]
pub struct ClusterDistributeCdnRevenues {
#[ink(topic)]
cluster_id: ClusterId,
#[ink(topic)]
provider_id: AccountId,
}

impl DdcBucket {

/// Creates a cluster of Storage nodes and CDN nodes.
Expand Down Expand Up @@ -832,30 +841,6 @@ pub mod ddc_bucket {
}
// ---- End Cluster ----

// ---- CDN Cluster ----

/// A new cluster was created.
#[ink(event)]
#[cfg_attr(feature = "std", derive(PartialEq, Debug, scale_info::TypeInfo))]
pub struct CdnClusterCreated {
#[ink(topic)]
cluster_id: ClusterId,
#[ink(topic)]
manager: AccountId,
}

/// The respective share of revenues of a CDN cluster for a provider was distributed.
#[ink(event)]
#[cfg_attr(feature = "std", derive(PartialEq, Debug, scale_info::TypeInfo))]
pub struct CdnClusterDistributeRevenues {
#[ink(topic)]
cluster_id: ClusterId,
#[ink(topic)]
provider_id: AccountId,
}

// ---- End CDN Cluster ----

// ---- Committer ----

impl DdcBucket {
Expand Down Expand Up @@ -1386,7 +1371,7 @@ pub mod ddc_bucket {
///
/// # Parameters
///
/// * `manager` - cluster manager account.
/// * `manager_id` - cluster manager account.
///
/// # Output
///
Expand All @@ -1402,9 +1387,9 @@ pub mod ddc_bucket {
#[ink(message, payable)]
pub fn grant_trusted_manager_permission(
&mut self,
manager: AccountId
manager_id: AccountId
) -> Result<()> {
self.message_grant_trusted_manager_permission(manager)
self.message_grant_trusted_manager_permission(manager_id)
}

/// Revokes permissions from cluster manager.
Expand All @@ -1415,7 +1400,7 @@ pub mod ddc_bucket {
///
/// # Parameters
///
/// * `manager` - cluster manager account.
/// * `manager_id` - cluster manager account.
///
/// # Output
///
Expand All @@ -1431,9 +1416,9 @@ pub mod ddc_bucket {
#[ink(message)]
pub fn revoke_trusted_manager_permission(
&mut self,
manager: AccountId
manager_id: AccountId
) -> Result<()> {
self.message_revoke_trusted_manager_permission(manager)
self.message_revoke_trusted_manager_permission(manager_id)
}

}
Expand Down
Loading

0 comments on commit 8d2236b

Please sign in to comment.