Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rename allowClawback flag to allowTrustLineClawback #4617

Merged
merged 7 commits into from
Jul 14, 2023

Conversation

shawnxie999
Copy link
Collaborator

@shawnxie999 shawnxie999 commented Jul 11, 2023

High Level Overview of Change

Context of Change

Reason for this change is here XRPLF/XRPL-Standards#119

We would want to be explicit that this flag is exclusively for trustline. For new token types(eg. CFT), they will not utilize this flag for clawback, instead, they will turn clawback on/off on the token-level, which is more versatile.

Type of Change

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to not work as expected)
  • Refactor (non-breaking change that only restructures code)
  • Tests (You added tests for code that already exists, or your new feature included in this PR)
  • Documentation Updates
  • Release

@shawnxie999 shawnxie999 marked this pull request as ready for review July 11, 2023 21:47
Copy link
Collaborator

@seelabs seelabs left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

lsfAllowClawback =
0x80000000, // True, enable clawback
lsfAllowTrustLineClawback =
0x80000000, // True, enable clawback
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

FYI - errant space

Copy link
Collaborator

@kennyzlei kennyzlei left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

delete space commit since last review lgtm

@kennyzlei kennyzlei added the Passed Passed code review & PR owner thinks it's ready to merge. Perf sign-off may still be required. label Jul 14, 2023
@kennyzlei kennyzlei merged commit 5ba1f98 into XRPLF:develop Jul 14, 2023
16 checks passed
@intelliot
Copy link
Collaborator

@kennyzlei @shawnxie999 this is a breaking API change compared to what was in develop prior to merging this PR, right?

If applicable, please add the API Change label.

@intelliot
Copy link
Collaborator

I think the Breaking change (fix or feature that would cause existing functionality to not work as expected) checkbox may also need to be checked

@shawnxie999
Copy link
Collaborator Author

@intelliot why would that be? clawback hasn't been released yet, this change would affect no one

Copy link
Collaborator

@ckeshava ckeshava left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm a bit late, this PR looks good 👍

@kennyzlei
Copy link
Collaborator

kennyzlei commented Jul 14, 2023

I think the Breaking change (fix or feature that would cause existing functionality to not work as expected) checkbox may also need to be checked

@intelliot I don't believe this is a breaking change either. The flag was renamed but the value of the flag is still the same (16). If any previous API usage was using the previous name, it should continue to work. Currently in devnet, this amendment is still not enabled, so there should not be any usage there

edit: I guess there is an API change in the response of the account_info endpoint if someone had the past version deployed with amendment on and switched to this new version. in our current release process, this did not happen but it could have theoretically happened with any commit in develop being available to be released. this could be considered a breaking change in that case

@intelliot intelliot mentioned this pull request Jul 18, 2023
7 tasks
@intelliot
Copy link
Collaborator

This is a breaking change to version 1.12.0-b1 which included the original Clawback implementation, and needs to be considered for docs and client libraries, which often only look at PRs labeled API Change when considering the changes to document and implement. For example, #4612 is only considering PRs with the API Change label.

intelliot added a commit to intelliot/rippled that referenced this pull request Jul 18, 2023
@intelliot intelliot mentioned this pull request Jul 18, 2023
1 task
ckeshava pushed a commit to ckeshava/rippled that referenced this pull request Sep 22, 2023
Reason for this change is here XRPLF/XRPL-Standards#119

We would want to be explicit that this flag is exclusively for trustline. For new token types(eg. CFT), they will not utilize this flag for clawback, instead, they will turn clawback on/off on the token-level, which is more versatile.
ckeshava pushed a commit to ckeshava/rippled that referenced this pull request Sep 25, 2023
Reason for this change is here XRPLF/XRPL-Standards#119

We would want to be explicit that this flag is exclusively for trustline. For new token types(eg. CFT), they will not utilize this flag for clawback, instead, they will turn clawback on/off on the token-level, which is more versatile.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Added to API Changelog API Change Clio Reviewed Passed Passed code review & PR owner thinks it's ready to merge. Perf sign-off may still be required. Trivial
Projects
Archived in project
Development

Successfully merging this pull request may close these issues.

6 participants