From 62471b5a411881c9e9d16707f25f2cd03c35c1a9 Mon Sep 17 00:00:00 2001 From: Benjamin Bollen <ben@erisindustries.com> Date: Thu, 9 Jun 2016 23:08:19 +0200 Subject: [PATCH] @compleatang changes fix to permissions -> evm connection; applied to discuss-eris-gateway branch https://github.com/eris-ltd/eris-db/commit/4769e410880a6daa7a6d2b5d1d7d3c86137223f2 Signed-off-by: Benjamin Bollen <ben@erisindustries.com> --- manager/eris-mint/evm/snative.go | 6 +++--- permission/types/permissions.go | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/manager/eris-mint/evm/snative.go b/manager/eris-mint/evm/snative.go index c7e11a6e..60c98b38 100644 --- a/manager/eris-mint/evm/snative.go +++ b/manager/eris-mint/evm/snative.go @@ -53,13 +53,13 @@ contract Permissions { // function identifiers from the solidity abi var PermsMap = map[string]SNativeFuncDescription{ - "054556ac": SNativeFuncDescription{"has_role", 2, ptypes.HasRole, has_role}, + "e8145855": SNativeFuncDescription{"has_role", 2, ptypes.HasRole, has_role}, "180d26f2": SNativeFuncDescription{"unset_base", 2, ptypes.UnsetBase, unset_base}, "3a3fcc59": SNativeFuncDescription{"set_global", 2, ptypes.SetGlobal, set_global}, - "9a1c4141": SNativeFuncDescription{"add_role", 2, ptypes.AddRole, add_role}, + "3fbf7da5": SNativeFuncDescription{"add_role", 2, ptypes.AddRole, add_role}, "9ea53314": SNativeFuncDescription{"set_base", 3, ptypes.SetBase, set_base}, "bb37737a": SNativeFuncDescription{"has_base", 2, ptypes.HasBase, has_base}, - "ded3350a": SNativeFuncDescription{"rm_role", 2, ptypes.RmRole, rm_role}, + "28fd0194": SNativeFuncDescription{"rm_role", 2, ptypes.RmRole, rm_role}, } func permissionsContract(appState AppState, caller *Account, args []byte, gas *int64) (output []byte, err error) { diff --git a/permission/types/permissions.go b/permission/types/permissions.go index 3c43ed17..d6700b3d 100644 --- a/permission/types/permissions.go +++ b/permission/types/permissions.go @@ -135,7 +135,7 @@ func (aP *AccountPermissions) HasRole(role string) bool { // Returns true if the role is added, and false if it already exists func (aP *AccountPermissions) AddRole(role string) bool { - role = string(LeftPadBytes([]byte(role), 32)) + role = string(RightPadBytes([]byte(role), 32)) for _, r := range aP.Roles { if r == role { return false -- GitLab