canton_api_client/models/js_prepare_submission_request.rs
1/*
2 * JSON Ledger API HTTP endpoints
3 *
4 * No description provided (generated by Openapi Generator https://github.com/openapitools/openapi-generator)
5 *
6 * The version of the OpenAPI document: 3.3.0-SNAPSHOT
7 *
8 * Generated by: https://openapi-generator.tech
9 */
10
11use crate::models;
12use serde::{Deserialize, Serialize};
13
14#[derive(Clone, Default, Debug, PartialEq, Serialize, Deserialize)]
15pub struct JsPrepareSubmissionRequest {
16 /// Uniquely identifies the participant user that prepares the transaction. Must be a valid UserIdString (as described in ``value.proto``). Required unless authentication is used with a user token. In that case, the token's user-id will be used for the request's user_id.
17 #[serde(rename = "userId")]
18 pub user_id: String,
19 /// Uniquely identifies the command. The triple (user_id, act_as, command_id) constitutes the change ID for the intended ledger change, where act_as is interpreted as a set of party names. The change ID can be used for matching the intended ledger changes with all their completions. Must be a valid LedgerString (as described in ``value.proto``). Required
20 #[serde(rename = "commandId")]
21 pub command_id: String,
22 /// Individual elements of this atomic command. Must be non-empty. Required
23 #[serde(rename = "commands", skip_serializing_if = "Option::is_none")]
24 pub commands: Option<Vec<models::Command>>,
25 #[serde(rename = "minLedgerTime", skip_serializing_if = "Option::is_none")]
26 pub min_ledger_time: Option<Box<models::MinLedgerTime>>,
27 /// Set of parties on whose behalf the command should be executed, if submitted. If ledger API authorization is enabled, then the authorization metadata must authorize the sender of the request to **read** (not act) on behalf of each of the given parties. This is because this RPC merely prepares a transaction and does not execute it. Therefore read authorization is sufficient even for actAs parties. Note: This may change, and more specific authorization scope may be introduced in the future. Each element must be a valid PartyIdString (as described in ``value.proto``). Required, must be non-empty.
28 #[serde(rename = "actAs", skip_serializing_if = "Option::is_none")]
29 pub act_as: Option<Vec<String>>,
30 /// Set of parties on whose behalf (in addition to all parties listed in ``act_as``) contracts can be retrieved. This affects Daml operations such as ``fetch``, ``fetchByKey``, ``lookupByKey``, ``exercise``, and ``exerciseByKey``. Note: A command can only use contracts that are visible to at least one of the parties in ``act_as`` or ``read_as``. This visibility check is independent from the Daml authorization rules for fetch operations. If ledger API authorization is enabled, then the authorization metadata must authorize the sender of the request to read contract data on behalf of each of the given parties. Optional
31 #[serde(rename = "readAs", skip_serializing_if = "Option::is_none")]
32 pub read_as: Option<Vec<String>>,
33 /// Additional contracts used to resolve contract & contract key lookups. Optional
34 #[serde(rename = "disclosedContracts", skip_serializing_if = "Option::is_none")]
35 pub disclosed_contracts: Option<Vec<models::DisclosedContract>>,
36 /// Must be a valid synchronizer id Required
37 #[serde(rename = "synchronizerId")]
38 pub synchronizer_id: String,
39 /// The package-id selection preference of the client for resolving package names and interface instances in command submission and interpretation
40 #[serde(rename = "packageIdSelectionPreference", skip_serializing_if = "Option::is_none")]
41 pub package_id_selection_preference: Option<Vec<String>>,
42 /// When true, the response will contain additional details on how the transaction was encoded and hashed This can be useful for troubleshooting of hash mismatches. Should only be used for debugging.
43 #[serde(rename = "verboseHashing")]
44 pub verbose_hashing: bool,
45}
46
47impl JsPrepareSubmissionRequest {
48 pub fn new(user_id: String, command_id: String, synchronizer_id: String, verbose_hashing: bool) -> JsPrepareSubmissionRequest {
49 JsPrepareSubmissionRequest {
50 user_id,
51 command_id,
52 commands: None,
53 min_ledger_time: None,
54 act_as: None,
55 read_as: None,
56 disclosed_contracts: None,
57 synchronizer_id,
58 package_id_selection_preference: None,
59 verbose_hashing,
60 }
61 }
62}
63