openethereum/secret-store/src/lib.rs

251 lines
7.9 KiB
Rust
Raw Normal View History

// Copyright 2015-2019 Parity Technologies (UK) Ltd.
// This file is part of Parity Ethereum.
// Parity Ethereum is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
// Parity Ethereum is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
// You should have received a copy of the GNU General Public License
// along with Parity Ethereum. If not, see <http://www.gnu.org/licenses/>.
extern crate byteorder;
extern crate common_types;
extern crate ethabi;
extern crate ethcore;
extern crate ethcore_call_contract as call_contract;
2018-04-10 12:13:49 +02:00
extern crate ethcore_sync as sync;
extern crate ethereum_types;
extern crate ethkey;
extern crate hyper;
extern crate keccak_hash as hash;
extern crate kvdb;
extern crate parity_bytes as bytes;
extern crate parity_crypto as crypto;
extern crate parity_runtime;
extern crate parking_lot;
v2.5.10 stable (#11239) * ropsten #6631425 foundation #8798209 (#11201) * [stable] builtin, istanbul and mordor testnet backports (#11234) * ethcore-builtin (#10850) * [builtin]: support `multiple prices and activations` in chain spec (#11039) * [chain specs]: activate `Istanbul` on mainnet (#11228) * ethcore/res: add mordor testnet configuration (#11200) * Update list of bootnodes for xDai chain (#11236) * ethcore: remove `test-helper feat` from build (#11047) * Secret store: fix Instant::now() related race in net_keep_alive (#11155) (#11159) * [stable]: backport #10691 and #10683 (#11143) * Fix compiler warning (that will become an error) (#10683) * Refactor Clique stepping (#10691) * Add Constantinople eips to the dev (instant_seal) config (#10809) * Add cargo-remote dir to .gitignore (?) * Insert explicit warning into the panic hook (#11225) * Fix docker centos build (#11226) * Update MIX bootnodes. (#11203) * Use provided usd-per-eth value if an endpoint is specified (#11209) * Add new line after writing block to hex file. (#10984) * Type annotation for next_key() matching of json filter options (#11192) (but no `FilterOption` in 2.5 so…) * Upgrade jsonrpc to latest (#11206) * [CI] check evmbin build (#11096) * Correct EIP-712 encoding (#11092) * [client]: Fix for incorrectly dropped consensus messages (#11086) * Fix block detail updating (#11015) * Switching sccache from local to Redis (#10971) * Made ecrecover implementation trait public (#11188) * [dependencies]: jsonrpc `14.0.1` (#11183) * [receipt]: add `sender` & `receiver` to `RichReceipts` (#11179) * [ethcore/builtin]: do not panic in blake2pricer on short input (#11180) * util Host: fix a double Read Lock bug in fn Host::session_readable() (#11175) * ethcore client: fix a double Read Lock bug in fn Client::logs() (#11172) * Change how RPCs eth_call and eth_estimateGas handle "Pending" (#11127) * Cleanup stratum a bit (#11161) * Upgrade to jsonrpc v14 (#11151) * SecretStore: expose restore_key_public in HTTP API (#10241)
2019-11-11 21:57:38 +01:00
extern crate percent_encoding;
extern crate rustc_hex;
extern crate serde;
extern crate serde_json;
SecretStore: administrative sessions prototypes (#6605) * generate random channel encryption key on restart * session-level nonces * fixed warning after rebase * session_nonce -> nonce * full_generation_math_session_with_refreshing_shares && full_generation_math_session_with_adding_new_node * add serveral secret shares at once * SecretStore: initial ShareAdd session prototype * SecretStore: ServersSetChange jobs * SecretStore: servers set change session continued * SecretStore: servers set change session continued * SecretStore: servers set change session continued * SecretStore: known_sessions iterator * SecretStore: implemented SessionsQueue * SecretStore: UnknownSessionsJobTransport * SecretStore: node_added_using_servers_set_change almost done * SecretStore: continue adding tests * SecretStore: node_added_using_servers_set_change + node_added_using_share_add * SecretStore: node_added_using_server_set_change_from_this_node * SecretStore: node_moved_using_share_move * SecretStore: node_moved_using_servers_set_change * SecretStore: node_removed_using_share_remove * SecretStore: node_removed_using_servers_set_change * SecretStore: different folders for client && admin sessions * SecretStore: started adding share change consensus (flush) * SecretStore: fixed spurious tests failures * enum JobPartialRequestAction * SecretStore: started adding consensus layer to ShareAdd session * SecretStore: starting external consensus for ShareAdd * SecretStore: started restoring node_added_using_servers_set_change * SecretStore: node_added_using_servers_set_change works with external consensus * SecretStore: node_added_using_server_set_change_from_this_node works with external consensus * removed debug comments/printlns * SecretStore: share move session supports consensus * SecretStore: share remove with external consensus * SecretStore: started adding basic ShareAdd tests * SecretStore: added ShareAdd tests * SecretStore: added ShareAdd session to cluster * SecretStore: added share move && remove sessions to cluster * SecretStore: ShareMove session tests cleanup * SecretStore: ShareRemove session tests cleanup * SecretStore: added check_secret_is_preserved check * SecretStore: added servers set change to cluster * SecretStore: cleaned up ServersSetChange session tests * SecretStore: cleaning + added tests for ShareRemove * SecretStore: cleaning up * SecretStore: propagated admin_public * SecretStore: fixed persistent_key_storage test * SecretStore: upgrade_db_from_1 * SecretStore: fixed ServersSetChange session completion * SecretStore: check polynom1 in ShareAdd sessions (error for pre-v2 shares) * SecretStore: fixing TODOs * SecretStore: fixing TODOs * SecretStore: check share change plan on 'old' slave nodes * SecretStore: fixing TODOs * SecretStore: store all admin sessions in single container to avoid overlaps * SecretStore: do not update nodes set during admin sessions * SecretStore: moved TODOs to appropriate methods * SecretStore: TODOs * SecretStore: added admin_public arg && fixed warnigs * SecretStore: added shares_to_move_reversed to ShareMove session * SecretStore: additional checks during consensus establishing * license * SecretStore: added TODO about starting ServersSetChange session * SecretStore: redundant clones + docs + lsot unimplemented-s * SecretStore: generation_session_completion_signalled_if_failed_on_master * SecretStore: updated obsolete comment * SecretStore: added type alias for current DocumentKeyShare serialization format * SecretStore: fixed typo * SecretStore; fixed warnings for futures 0.1.15 * fixed warning
2017-10-02 15:27:31 +02:00
extern crate tiny_keccak;
extern crate tokio;
extern crate tokio_io;
extern crate tokio_service;
extern crate url;
#[macro_use]
extern crate ethabi_derive;
#[macro_use]
extern crate ethabi_contract;
#[macro_use]
extern crate futures;
#[macro_use]
extern crate serde_derive;
#[macro_use]
extern crate lazy_static;
#[macro_use]
extern crate log;
#[cfg(test)]
extern crate env_logger;
#[cfg(test)]
extern crate kvdb_rocksdb;
#[cfg(feature = "accounts")]
extern crate ethcore_accounts as accounts;
2020-08-05 06:08:03 +02:00
mod helpers;
mod key_server_cluster;
mod types;
mod acl_storage;
mod key_server;
2017-07-19 10:35:17 +02:00
mod key_server_set;
2020-08-05 06:08:03 +02:00
mod key_storage;
mod listener;
2020-08-05 06:08:03 +02:00
mod node_key_pair;
mod serialization;
mod traits;
2017-12-20 14:02:21 +01:00
mod trusted_client;
2020-08-05 06:08:03 +02:00
use ethcore::{client::Client, miner::Miner};
use kvdb::KeyValueDB;
use parity_runtime::Executor;
2020-08-05 06:08:03 +02:00
use std::sync::Arc;
use sync::SyncProvider;
#[cfg(feature = "accounts")]
pub use self::node_key_pair::KeyStoreNodeKeyPair;
2020-08-05 06:08:03 +02:00
pub use self::node_key_pair::PlainNodeKeyPair;
pub use traits::{KeyServer, NodeKeyPair};
pub use types::{
ClusterConfiguration, ContractAddress, EncryptedDocumentKey, Error, NodeAddress, Public,
RequestSignature, ServerKeyId, ServiceConfiguration,
};
/// Start new key server instance
2020-08-05 06:08:03 +02:00
pub fn start(
client: Arc<Client>,
2020-07-29 10:36:15 +02:00
sync: Arc<dyn SyncProvider>,
2020-08-05 06:08:03 +02:00
miner: Arc<Miner>,
2020-07-29 10:36:15 +02:00
self_key_pair: Arc<dyn NodeKeyPair>,
2020-08-05 06:08:03 +02:00
mut config: ServiceConfiguration,
2020-07-29 10:36:15 +02:00
db: Arc<dyn KeyValueDB>,
2020-08-05 06:08:03 +02:00
executor: Executor,
2020-07-29 10:36:15 +02:00
) -> Result<Box<dyn KeyServer>, Error> {
2020-08-05 06:08:03 +02:00
let trusted_client =
trusted_client::TrustedClient::new(self_key_pair.clone(), client.clone(), sync, miner);
2020-07-29 10:36:15 +02:00
let acl_storage: Arc<dyn acl_storage::AclStorage> =
match config.acl_check_contract_address.take() {
Some(acl_check_contract_address) => acl_storage::OnChainAclStorage::new(
trusted_client.clone(),
acl_check_contract_address,
)?,
None => Arc::new(acl_storage::DummyAclStorage::default()),
};
2020-08-05 06:08:03 +02:00
let key_server_set = key_server_set::OnChainKeyServerSet::new(
trusted_client.clone(),
config.cluster_config.key_server_set_contract_address.take(),
self_key_pair.clone(),
config.cluster_config.auto_migrate_enabled,
config.cluster_config.nodes.clone(),
)?;
let key_storage = Arc::new(key_storage::PersistentKeyStorage::new(db)?);
let key_server = Arc::new(key_server::KeyServerImpl::new(
&config.cluster_config,
key_server_set.clone(),
self_key_pair.clone(),
acl_storage.clone(),
key_storage.clone(),
executor.clone(),
)?);
let cluster = key_server.cluster();
2020-07-29 10:36:15 +02:00
let key_server: Arc<dyn KeyServer> = key_server;
2020-08-05 06:08:03 +02:00
// prepare HTTP listener
let http_listener = match config.listener_address {
Some(listener_address) => Some(listener::http_listener::KeyServerHttpListener::start(
listener_address,
Arc::downgrade(&key_server),
executor,
)?),
None => None,
};
// prepare service contract listeners
let create_service_contract = |address, name, api_mask| {
Arc::new(listener::service_contract::OnChainServiceContract::new(
api_mask,
trusted_client.clone(),
name,
address,
self_key_pair.clone(),
))
};
2020-07-29 10:36:15 +02:00
let mut contracts: Vec<Arc<dyn listener::service_contract::ServiceContract>> = Vec::new();
2020-08-05 06:08:03 +02:00
config
.service_contract_address
.map(|address| {
create_service_contract(
address,
listener::service_contract::SERVICE_CONTRACT_REGISTRY_NAME.to_owned(),
listener::ApiMask::all(),
)
})
.map(|l| contracts.push(l));
config
.service_contract_srv_gen_address
.map(|address| {
create_service_contract(
address,
listener::service_contract::SRV_KEY_GEN_SERVICE_CONTRACT_REGISTRY_NAME.to_owned(),
listener::ApiMask {
server_key_generation_requests: true,
..Default::default()
},
)
})
.map(|l| contracts.push(l));
config
.service_contract_srv_retr_address
.map(|address| {
create_service_contract(
address,
listener::service_contract::SRV_KEY_RETR_SERVICE_CONTRACT_REGISTRY_NAME.to_owned(),
listener::ApiMask {
server_key_retrieval_requests: true,
..Default::default()
},
)
})
.map(|l| contracts.push(l));
config
.service_contract_doc_store_address
.map(|address| {
create_service_contract(
address,
listener::service_contract::DOC_KEY_STORE_SERVICE_CONTRACT_REGISTRY_NAME.to_owned(),
listener::ApiMask {
document_key_store_requests: true,
..Default::default()
},
)
})
.map(|l| contracts.push(l));
config
.service_contract_doc_sretr_address
.map(|address| {
create_service_contract(
address,
listener::service_contract::DOC_KEY_SRETR_SERVICE_CONTRACT_REGISTRY_NAME.to_owned(),
listener::ApiMask {
document_key_shadow_retrieval_requests: true,
..Default::default()
},
)
})
.map(|l| contracts.push(l));
2020-07-29 10:36:15 +02:00
let contract: Option<Arc<dyn listener::service_contract::ServiceContract>> = match contracts
.len()
{
2020-08-05 06:08:03 +02:00
0 => None,
1 => Some(contracts.pop().expect("contract.len() is 1; qed")),
_ => Some(Arc::new(
listener::service_contract_aggregate::OnChainServiceContractAggregate::new(contracts),
)),
};
let contract_listener = match contract {
Some(contract) => Some({
let listener = listener::service_contract_listener::ServiceContractListener::new(
listener::service_contract_listener::ServiceContractListenerParams {
contract: contract,
self_key_pair: self_key_pair.clone(),
key_server_set: key_server_set,
acl_storage: acl_storage,
cluster: cluster,
key_storage: key_storage,
},
)?;
client.add_notify(listener.clone());
listener
}),
None => None,
};
Ok(Box::new(listener::Listener::new(
key_server,
http_listener,
contract_listener,
)))
}