2019-01-07 11:33:07 +01:00
|
|
|
// Copyright 2015-2019 Parity Technologies (UK) Ltd.
|
|
|
|
// This file is part of Parity Ethereum.
|
2017-11-02 15:33:11 +01:00
|
|
|
|
2019-01-07 11:33:07 +01:00
|
|
|
// Parity Ethereum is free software: you can redistribute it and/or modify
|
2017-11-02 15:33:11 +01:00
|
|
|
// it under the terms of the GNU General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
|
2019-01-07 11:33:07 +01:00
|
|
|
// Parity Ethereum is distributed in the hope that it will be useful,
|
2017-11-02 15:33:11 +01:00
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU General Public License for more details.
|
|
|
|
|
|
|
|
// You should have received a copy of the GNU General Public License
|
2019-01-07 11:33:07 +01:00
|
|
|
// along with Parity Ethereum. If not, see <http://www.gnu.org/licenses/>.
|
2017-11-02 15:33:11 +01:00
|
|
|
|
|
|
|
use std::sync::Arc;
|
|
|
|
use std::sync::atomic::{AtomicBool, AtomicUsize, Ordering};
|
|
|
|
use std::collections::BTreeMap;
|
|
|
|
use parking_lot::RwLock;
|
2018-03-19 06:42:40 +01:00
|
|
|
use ethkey::Public;
|
|
|
|
use key_server_cluster::{Error, NodeId, SessionId, Requester, AclStorage, KeyStorage, DocumentKeyShare, SessionMeta};
|
2017-11-02 15:33:11 +01:00
|
|
|
use key_server_cluster::cluster::{Cluster, ClusterConfiguration};
|
2018-01-10 11:33:45 +01:00
|
|
|
use key_server_cluster::connection_trigger::ServersSetChangeSessionCreatorConnector;
|
2017-11-02 15:33:11 +01:00
|
|
|
use key_server_cluster::cluster_sessions::{ClusterSession, SessionIdWithSubSession, AdminSession, AdminSessionCreationData};
|
2018-03-01 09:59:21 +01:00
|
|
|
use key_server_cluster::message::{self, Message, DecryptionMessage, SchnorrSigningMessage, ConsensusMessageOfShareAdd,
|
|
|
|
ShareAddMessage, ServersSetChangeMessage, ConsensusMessage, ConsensusMessageWithServersSet, EcdsaSigningMessage};
|
2017-11-02 15:33:11 +01:00
|
|
|
use key_server_cluster::generation_session::{SessionImpl as GenerationSessionImpl, SessionParams as GenerationSessionParams};
|
|
|
|
use key_server_cluster::decryption_session::{SessionImpl as DecryptionSessionImpl,
|
|
|
|
SessionParams as DecryptionSessionParams};
|
|
|
|
use key_server_cluster::encryption_session::{SessionImpl as EncryptionSessionImpl, SessionParams as EncryptionSessionParams};
|
2018-03-01 09:59:21 +01:00
|
|
|
use key_server_cluster::signing_session_ecdsa::{SessionImpl as EcdsaSigningSessionImpl,
|
|
|
|
SessionParams as EcdsaSigningSessionParams};
|
|
|
|
use key_server_cluster::signing_session_schnorr::{SessionImpl as SchnorrSigningSessionImpl,
|
|
|
|
SessionParams as SchnorrSigningSessionParams};
|
2017-11-02 15:33:11 +01:00
|
|
|
use key_server_cluster::share_add_session::{SessionImpl as ShareAddSessionImpl,
|
|
|
|
SessionParams as ShareAddSessionParams, IsolatedSessionTransport as ShareAddTransport};
|
|
|
|
use key_server_cluster::servers_set_change_session::{SessionImpl as ServersSetChangeSessionImpl,
|
|
|
|
SessionParams as ServersSetChangeSessionParams};
|
|
|
|
use key_server_cluster::key_version_negotiation_session::{SessionImpl as KeyVersionNegotiationSessionImpl,
|
|
|
|
SessionParams as KeyVersionNegotiationSessionParams, IsolatedSessionTransport as VersionNegotiationTransport,
|
|
|
|
FastestResultComputer as FastestResultKeyVersionsResultComputer};
|
|
|
|
use key_server_cluster::admin_sessions::ShareChangeSessionMeta;
|
|
|
|
|
|
|
|
/// Generic cluster session creator.
|
|
|
|
pub trait ClusterSessionCreator<S: ClusterSession, D> {
|
|
|
|
/// Get creation data from message.
|
|
|
|
fn creation_data_from_message(_message: &Message) -> Result<Option<D>, Error> {
|
|
|
|
Ok(None)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Prepare error message.
|
|
|
|
fn make_error_message(sid: S::Id, nonce: u64, err: Error) -> Message;
|
|
|
|
|
|
|
|
/// Create cluster session.
|
|
|
|
fn create(&self, cluster: Arc<Cluster>, master: NodeId, nonce: Option<u64>, id: S::Id, creation_data: Option<D>) -> Result<Arc<S>, Error>;
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Message with session id.
|
|
|
|
pub trait IntoSessionId<K> {
|
|
|
|
/// Get session id.
|
|
|
|
fn into_session_id(&self) -> Result<K, Error>;
|
|
|
|
}
|
|
|
|
|
|
|
|
pub struct SessionCreatorCore {
|
|
|
|
/// Self node id.
|
|
|
|
self_node_id: NodeId,
|
|
|
|
/// Reference to key storage
|
|
|
|
key_storage: Arc<KeyStorage>,
|
|
|
|
/// Reference to ACL storage
|
|
|
|
acl_storage: Arc<AclStorage>,
|
|
|
|
/// Always-increasing sessions counter. Is used as session nonce to prevent replay attacks:
|
|
|
|
/// 1) during handshake, KeyServers generate new random key to encrypt messages
|
|
|
|
/// => there's no way to use messages from previous connections for replay attacks
|
|
|
|
/// 2) when session (of any type) is started, master node increases its own session counter and broadcasts it
|
|
|
|
/// 3) when slave KeyServer receives session initialization message, it checks that new nonce is larger than previous (from the same master)
|
|
|
|
/// => there's no way to use messages from previous sessions for replay attacks
|
|
|
|
/// 4) KeyServer checks that each session message contains the same nonce that initialization message
|
|
|
|
/// Given that: (A) handshake is secure and (B) session itself is initially replay-protected
|
|
|
|
/// => this guarantees that sessions are replay-protected.
|
|
|
|
session_counter: AtomicUsize,
|
|
|
|
/// Maximal session nonce, received from given connection.
|
|
|
|
max_nonce: RwLock<BTreeMap<NodeId, u64>>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl SessionCreatorCore {
|
|
|
|
/// Create new session creator core.
|
|
|
|
pub fn new(config: &ClusterConfiguration) -> Self {
|
|
|
|
SessionCreatorCore {
|
|
|
|
self_node_id: config.self_key_pair.public().clone(),
|
|
|
|
acl_storage: config.acl_storage.clone(),
|
|
|
|
key_storage: config.key_storage.clone(),
|
|
|
|
session_counter: AtomicUsize::new(0),
|
|
|
|
max_nonce: RwLock::new(BTreeMap::new()),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// When node has teimtouted.
|
|
|
|
pub fn on_connection_timeout(&self, node_id: &NodeId) {
|
|
|
|
self.max_nonce.write().remove(node_id);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Check or generate new session nonce.
|
|
|
|
fn check_session_nonce(&self, master: &NodeId, nonce: Option<u64>) -> Result<u64, Error> {
|
|
|
|
// if we're master node of the session, then nonce should be generated
|
|
|
|
// if we're slave node of the session, then nonce should be passed from outside
|
|
|
|
match nonce {
|
|
|
|
Some(nonce) => match nonce > *self.max_nonce.write().entry(master.clone()).or_insert(0) {
|
|
|
|
true => Ok(nonce),
|
|
|
|
false => Err(Error::ReplayProtection),
|
|
|
|
},
|
|
|
|
None => Ok(self.session_counter.fetch_add(1, Ordering::Relaxed) as u64 + 1),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Read key share && remove disconnected nodes.
|
|
|
|
fn read_key_share(&self, key_id: &SessionId) -> Result<Option<DocumentKeyShare>, Error> {
|
2018-05-01 15:02:14 +02:00
|
|
|
self.key_storage.get(key_id)
|
2017-11-02 15:33:11 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Generation session creator.
|
|
|
|
pub struct GenerationSessionCreator {
|
|
|
|
/// True if generation sessions must fail.
|
|
|
|
pub make_faulty_generation_sessions: AtomicBool,
|
|
|
|
/// Creator core.
|
|
|
|
pub core: Arc<SessionCreatorCore>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl GenerationSessionCreator {
|
|
|
|
#[cfg(test)]
|
|
|
|
pub fn make_faulty_generation_sessions(&self) {
|
|
|
|
self.make_faulty_generation_sessions.store(true, Ordering::Relaxed);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl ClusterSessionCreator<GenerationSessionImpl, ()> for GenerationSessionCreator {
|
|
|
|
fn make_error_message(sid: SessionId, nonce: u64, err: Error) -> Message {
|
|
|
|
message::Message::Generation(message::GenerationMessage::SessionError(message::SessionError {
|
|
|
|
session: sid.into(),
|
|
|
|
session_nonce: nonce,
|
|
|
|
error: err.into(),
|
|
|
|
}))
|
|
|
|
}
|
|
|
|
|
|
|
|
fn create(&self, cluster: Arc<Cluster>, master: NodeId, nonce: Option<u64>, id: SessionId, _creation_data: Option<()>) -> Result<Arc<GenerationSessionImpl>, Error> {
|
|
|
|
// check that there's no finished encryption session with the same id
|
|
|
|
if self.core.key_storage.contains(&id) {
|
2018-05-01 15:02:14 +02:00
|
|
|
return Err(Error::ServerKeyAlreadyGenerated);
|
2017-11-02 15:33:11 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
let nonce = self.core.check_session_nonce(&master, nonce)?;
|
|
|
|
Ok(GenerationSessionImpl::new(GenerationSessionParams {
|
|
|
|
id: id.clone(),
|
|
|
|
self_node_id: self.core.self_node_id.clone(),
|
|
|
|
key_storage: Some(self.core.key_storage.clone()),
|
|
|
|
cluster: cluster,
|
|
|
|
nonce: Some(nonce),
|
|
|
|
}))
|
|
|
|
.map(|session| {
|
|
|
|
if self.make_faulty_generation_sessions.load(Ordering::Relaxed) {
|
|
|
|
session.simulate_faulty_behaviour();
|
|
|
|
}
|
|
|
|
session
|
|
|
|
})
|
|
|
|
.map(Arc::new)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Encryption session creator.
|
|
|
|
pub struct EncryptionSessionCreator {
|
|
|
|
/// Creator core.
|
|
|
|
pub core: Arc<SessionCreatorCore>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl ClusterSessionCreator<EncryptionSessionImpl, ()> for EncryptionSessionCreator {
|
|
|
|
fn make_error_message(sid: SessionId, nonce: u64, err: Error) -> Message {
|
|
|
|
message::Message::Encryption(message::EncryptionMessage::EncryptionSessionError(message::EncryptionSessionError {
|
|
|
|
session: sid.into(),
|
|
|
|
session_nonce: nonce,
|
|
|
|
error: err.into(),
|
|
|
|
}))
|
|
|
|
}
|
|
|
|
|
|
|
|
fn create(&self, cluster: Arc<Cluster>, master: NodeId, nonce: Option<u64>, id: SessionId, _creation_data: Option<()>) -> Result<Arc<EncryptionSessionImpl>, Error> {
|
|
|
|
let encrypted_data = self.core.read_key_share(&id)?;
|
|
|
|
let nonce = self.core.check_session_nonce(&master, nonce)?;
|
|
|
|
Ok(Arc::new(EncryptionSessionImpl::new(EncryptionSessionParams {
|
|
|
|
id: id,
|
|
|
|
self_node_id: self.core.self_node_id.clone(),
|
|
|
|
encrypted_data: encrypted_data,
|
|
|
|
key_storage: self.core.key_storage.clone(),
|
|
|
|
cluster: cluster,
|
|
|
|
nonce: nonce,
|
|
|
|
})?))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Decryption session creator.
|
|
|
|
pub struct DecryptionSessionCreator {
|
|
|
|
/// Creator core.
|
|
|
|
pub core: Arc<SessionCreatorCore>,
|
|
|
|
}
|
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
impl ClusterSessionCreator<DecryptionSessionImpl, Requester> for DecryptionSessionCreator {
|
|
|
|
fn creation_data_from_message(message: &Message) -> Result<Option<Requester>, Error> {
|
2017-11-02 15:33:11 +01:00
|
|
|
match *message {
|
|
|
|
Message::Decryption(DecryptionMessage::DecryptionConsensusMessage(ref message)) => match &message.message {
|
2018-03-19 06:42:40 +01:00
|
|
|
&ConsensusMessage::InitializeConsensusSession(ref message) => Ok(Some(message.requester.clone().into())),
|
2017-11-02 15:33:11 +01:00
|
|
|
_ => Err(Error::InvalidMessage),
|
|
|
|
},
|
2018-03-19 06:42:40 +01:00
|
|
|
Message::Decryption(DecryptionMessage::DecryptionSessionDelegation(ref message)) => Ok(Some(message.requester.clone().into())),
|
2017-11-02 15:33:11 +01:00
|
|
|
_ => Err(Error::InvalidMessage),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn make_error_message(sid: SessionIdWithSubSession, nonce: u64, err: Error) -> Message {
|
|
|
|
message::Message::Decryption(message::DecryptionMessage::DecryptionSessionError(message::DecryptionSessionError {
|
|
|
|
session: sid.id.into(),
|
|
|
|
sub_session: sid.access_key.into(),
|
|
|
|
session_nonce: nonce,
|
|
|
|
error: err.into(),
|
|
|
|
}))
|
|
|
|
}
|
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
fn create(&self, cluster: Arc<Cluster>, master: NodeId, nonce: Option<u64>, id: SessionIdWithSubSession, requester: Option<Requester>) -> Result<Arc<DecryptionSessionImpl>, Error> {
|
2017-11-02 15:33:11 +01:00
|
|
|
let encrypted_data = self.core.read_key_share(&id.id)?;
|
|
|
|
let nonce = self.core.check_session_nonce(&master, nonce)?;
|
|
|
|
Ok(Arc::new(DecryptionSessionImpl::new(DecryptionSessionParams {
|
|
|
|
meta: SessionMeta {
|
|
|
|
id: id.id,
|
|
|
|
self_node_id: self.core.self_node_id.clone(),
|
|
|
|
master_node_id: master,
|
|
|
|
threshold: encrypted_data.as_ref().map(|ks| ks.threshold).unwrap_or_default(),
|
2018-05-01 15:02:14 +02:00
|
|
|
configured_nodes_count: cluster.configured_nodes_count(),
|
|
|
|
connected_nodes_count: cluster.connected_nodes_count(),
|
2017-11-02 15:33:11 +01:00
|
|
|
},
|
|
|
|
access_key: id.access_key,
|
|
|
|
key_share: encrypted_data,
|
|
|
|
acl_storage: self.core.acl_storage.clone(),
|
|
|
|
cluster: cluster,
|
|
|
|
nonce: nonce,
|
2018-03-19 06:42:40 +01:00
|
|
|
}, requester)?))
|
2017-11-02 15:33:11 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-01 09:59:21 +01:00
|
|
|
/// Schnorr signing session creator.
|
|
|
|
pub struct SchnorrSigningSessionCreator {
|
2017-11-02 15:33:11 +01:00
|
|
|
/// Creator core.
|
|
|
|
pub core: Arc<SessionCreatorCore>,
|
|
|
|
}
|
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
impl ClusterSessionCreator<SchnorrSigningSessionImpl, Requester> for SchnorrSigningSessionCreator {
|
|
|
|
fn creation_data_from_message(message: &Message) -> Result<Option<Requester>, Error> {
|
2017-11-02 15:33:11 +01:00
|
|
|
match *message {
|
2018-03-01 09:59:21 +01:00
|
|
|
Message::SchnorrSigning(SchnorrSigningMessage::SchnorrSigningConsensusMessage(ref message)) => match &message.message {
|
2018-03-19 06:42:40 +01:00
|
|
|
&ConsensusMessage::InitializeConsensusSession(ref message) => Ok(Some(message.requester.clone().into())),
|
2017-11-02 15:33:11 +01:00
|
|
|
_ => Err(Error::InvalidMessage),
|
|
|
|
},
|
2018-03-19 06:42:40 +01:00
|
|
|
Message::SchnorrSigning(SchnorrSigningMessage::SchnorrSigningSessionDelegation(ref message)) => Ok(Some(message.requester.clone().into())),
|
2017-11-02 15:33:11 +01:00
|
|
|
_ => Err(Error::InvalidMessage),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn make_error_message(sid: SessionIdWithSubSession, nonce: u64, err: Error) -> Message {
|
2018-03-01 09:59:21 +01:00
|
|
|
message::Message::SchnorrSigning(message::SchnorrSigningMessage::SchnorrSigningSessionError(message::SchnorrSigningSessionError {
|
2017-11-02 15:33:11 +01:00
|
|
|
session: sid.id.into(),
|
|
|
|
sub_session: sid.access_key.into(),
|
|
|
|
session_nonce: nonce,
|
|
|
|
error: err.into(),
|
|
|
|
}))
|
|
|
|
}
|
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
fn create(&self, cluster: Arc<Cluster>, master: NodeId, nonce: Option<u64>, id: SessionIdWithSubSession, requester: Option<Requester>) -> Result<Arc<SchnorrSigningSessionImpl>, Error> {
|
2017-11-02 15:33:11 +01:00
|
|
|
let encrypted_data = self.core.read_key_share(&id.id)?;
|
|
|
|
let nonce = self.core.check_session_nonce(&master, nonce)?;
|
2018-03-01 09:59:21 +01:00
|
|
|
Ok(Arc::new(SchnorrSigningSessionImpl::new(SchnorrSigningSessionParams {
|
|
|
|
meta: SessionMeta {
|
|
|
|
id: id.id,
|
|
|
|
self_node_id: self.core.self_node_id.clone(),
|
|
|
|
master_node_id: master,
|
|
|
|
threshold: encrypted_data.as_ref().map(|ks| ks.threshold).unwrap_or_default(),
|
2018-05-01 15:02:14 +02:00
|
|
|
configured_nodes_count: cluster.configured_nodes_count(),
|
|
|
|
connected_nodes_count: cluster.connected_nodes_count(),
|
2018-03-01 09:59:21 +01:00
|
|
|
},
|
|
|
|
access_key: id.access_key,
|
|
|
|
key_share: encrypted_data,
|
|
|
|
acl_storage: self.core.acl_storage.clone(),
|
|
|
|
cluster: cluster,
|
|
|
|
nonce: nonce,
|
2018-03-19 06:42:40 +01:00
|
|
|
}, requester)?))
|
2018-03-01 09:59:21 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// ECDSA signing session creator.
|
|
|
|
pub struct EcdsaSigningSessionCreator {
|
|
|
|
/// Creator core.
|
|
|
|
pub core: Arc<SessionCreatorCore>,
|
|
|
|
}
|
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
impl ClusterSessionCreator<EcdsaSigningSessionImpl, Requester> for EcdsaSigningSessionCreator {
|
|
|
|
fn creation_data_from_message(message: &Message) -> Result<Option<Requester>, Error> {
|
2018-03-01 09:59:21 +01:00
|
|
|
match *message {
|
|
|
|
Message::EcdsaSigning(EcdsaSigningMessage::EcdsaSigningConsensusMessage(ref message)) => match &message.message {
|
2018-03-19 06:42:40 +01:00
|
|
|
&ConsensusMessage::InitializeConsensusSession(ref message) => Ok(Some(message.requester.clone().into())),
|
2018-03-01 09:59:21 +01:00
|
|
|
_ => Err(Error::InvalidMessage),
|
|
|
|
},
|
2018-03-19 06:42:40 +01:00
|
|
|
Message::EcdsaSigning(EcdsaSigningMessage::EcdsaSigningSessionDelegation(ref message)) => Ok(Some(message.requester.clone().into())),
|
2018-03-01 09:59:21 +01:00
|
|
|
_ => Err(Error::InvalidMessage),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn make_error_message(sid: SessionIdWithSubSession, nonce: u64, err: Error) -> Message {
|
|
|
|
message::Message::EcdsaSigning(message::EcdsaSigningMessage::EcdsaSigningSessionError(message::EcdsaSigningSessionError {
|
|
|
|
session: sid.id.into(),
|
|
|
|
sub_session: sid.access_key.into(),
|
|
|
|
session_nonce: nonce,
|
|
|
|
error: err.into(),
|
|
|
|
}))
|
|
|
|
}
|
|
|
|
|
2018-03-19 06:42:40 +01:00
|
|
|
fn create(&self, cluster: Arc<Cluster>, master: NodeId, nonce: Option<u64>, id: SessionIdWithSubSession, requester: Option<Requester>) -> Result<Arc<EcdsaSigningSessionImpl>, Error> {
|
2018-03-01 09:59:21 +01:00
|
|
|
let encrypted_data = self.core.read_key_share(&id.id)?;
|
|
|
|
let nonce = self.core.check_session_nonce(&master, nonce)?;
|
|
|
|
Ok(Arc::new(EcdsaSigningSessionImpl::new(EcdsaSigningSessionParams {
|
2017-11-02 15:33:11 +01:00
|
|
|
meta: SessionMeta {
|
|
|
|
id: id.id,
|
|
|
|
self_node_id: self.core.self_node_id.clone(),
|
|
|
|
master_node_id: master,
|
|
|
|
threshold: encrypted_data.as_ref().map(|ks| ks.threshold).unwrap_or_default(),
|
2018-05-01 15:02:14 +02:00
|
|
|
configured_nodes_count: cluster.configured_nodes_count(),
|
|
|
|
connected_nodes_count: cluster.connected_nodes_count(),
|
2017-11-02 15:33:11 +01:00
|
|
|
},
|
|
|
|
access_key: id.access_key,
|
|
|
|
key_share: encrypted_data,
|
|
|
|
acl_storage: self.core.acl_storage.clone(),
|
|
|
|
cluster: cluster,
|
|
|
|
nonce: nonce,
|
2018-03-19 06:42:40 +01:00
|
|
|
}, requester)?))
|
2017-11-02 15:33:11 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Key version negotiation session creator.
|
|
|
|
pub struct KeyVersionNegotiationSessionCreator {
|
|
|
|
/// Creator core.
|
|
|
|
pub core: Arc<SessionCreatorCore>,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl ClusterSessionCreator<KeyVersionNegotiationSessionImpl<VersionNegotiationTransport>, ()> for KeyVersionNegotiationSessionCreator {
|
|
|
|
fn make_error_message(sid: SessionIdWithSubSession, nonce: u64, err: Error) -> Message {
|
|
|
|
message::Message::KeyVersionNegotiation(message::KeyVersionNegotiationMessage::KeyVersionsError(message::KeyVersionsError {
|
|
|
|
session: sid.id.into(),
|
|
|
|
sub_session: sid.access_key.into(),
|
|
|
|
session_nonce: nonce,
|
|
|
|
error: err.into(),
|
2018-06-14 09:01:52 +02:00
|
|
|
// we don't care about continue action here. it only matters when we're completing the session with confirmed
|
|
|
|
// fatal error from result computer
|
|
|
|
continue_with: None,
|
2017-11-02 15:33:11 +01:00
|
|
|
}))
|
|
|
|
}
|
|
|
|
|
|
|
|
fn create(&self, cluster: Arc<Cluster>, master: NodeId, nonce: Option<u64>, id: SessionIdWithSubSession, _creation_data: Option<()>) -> Result<Arc<KeyVersionNegotiationSessionImpl<VersionNegotiationTransport>>, Error> {
|
2018-05-01 15:02:14 +02:00
|
|
|
let configured_nodes_count = cluster.configured_nodes_count();
|
|
|
|
let connected_nodes_count = cluster.connected_nodes_count();
|
2017-11-02 15:33:11 +01:00
|
|
|
let encrypted_data = self.core.read_key_share(&id.id)?;
|
|
|
|
let nonce = self.core.check_session_nonce(&master, nonce)?;
|
2018-05-01 15:02:14 +02:00
|
|
|
let computer = Arc::new(FastestResultKeyVersionsResultComputer::new(self.core.self_node_id.clone(), encrypted_data.as_ref(),
|
|
|
|
configured_nodes_count, configured_nodes_count));
|
2017-11-02 15:33:11 +01:00
|
|
|
Ok(Arc::new(KeyVersionNegotiationSessionImpl::new(KeyVersionNegotiationSessionParams {
|
|
|
|
meta: ShareChangeSessionMeta {
|
|
|
|
id: id.id.clone(),
|
|
|
|
self_node_id: self.core.self_node_id.clone(),
|
|
|
|
master_node_id: master,
|
2018-05-01 15:02:14 +02:00
|
|
|
configured_nodes_count: configured_nodes_count,
|
|
|
|
connected_nodes_count: connected_nodes_count,
|
2017-11-02 15:33:11 +01:00
|
|
|
},
|
|
|
|
sub_session: id.access_key.clone(),
|
|
|
|
key_share: encrypted_data,
|
|
|
|
result_computer: computer,
|
|
|
|
transport: VersionNegotiationTransport {
|
|
|
|
cluster: cluster,
|
|
|
|
key_id: id.id,
|
|
|
|
sub_session: id.access_key.clone(),
|
|
|
|
nonce: nonce,
|
|
|
|
},
|
|
|
|
nonce: nonce,
|
|
|
|
})))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Administrative session creator.
|
|
|
|
pub struct AdminSessionCreator {
|
|
|
|
/// Creator core.
|
|
|
|
pub core: Arc<SessionCreatorCore>,
|
|
|
|
/// Administrator public.
|
|
|
|
pub admin_public: Option<Public>,
|
2018-01-10 11:33:45 +01:00
|
|
|
/// Servers set change sessions creator connector.
|
|
|
|
pub servers_set_change_session_creator_connector: Arc<ServersSetChangeSessionCreatorConnector>,
|
2017-11-02 15:33:11 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
impl ClusterSessionCreator<AdminSession, AdminSessionCreationData> for AdminSessionCreator {
|
|
|
|
fn creation_data_from_message(message: &Message) -> Result<Option<AdminSessionCreationData>, Error> {
|
|
|
|
match *message {
|
|
|
|
Message::ServersSetChange(ServersSetChangeMessage::ServersSetChangeConsensusMessage(ref message)) => match &message.message {
|
2018-01-10 11:33:45 +01:00
|
|
|
&ConsensusMessageWithServersSet::InitializeConsensusSession(ref message) => Ok(Some(AdminSessionCreationData::ServersSetChange(
|
|
|
|
message.migration_id.clone().map(Into::into),
|
|
|
|
message.new_nodes_set.clone().into_iter().map(Into::into).collect()
|
|
|
|
))),
|
2017-11-02 15:33:11 +01:00
|
|
|
_ => Err(Error::InvalidMessage),
|
|
|
|
},
|
|
|
|
Message::ShareAdd(ShareAddMessage::ShareAddConsensusMessage(ref message)) => match &message.message {
|
|
|
|
&ConsensusMessageOfShareAdd::InitializeConsensusSession(ref message) => Ok(Some(AdminSessionCreationData::ShareAdd(message.version.clone().into()))),
|
|
|
|
_ => Err(Error::InvalidMessage),
|
|
|
|
},
|
|
|
|
_ => Err(Error::InvalidMessage),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn make_error_message(sid: SessionId, nonce: u64, err: Error) -> Message {
|
|
|
|
message::Message::ServersSetChange(message::ServersSetChangeMessage::ServersSetChangeError(message::ServersSetChangeError {
|
|
|
|
session: sid.into(),
|
|
|
|
session_nonce: nonce,
|
|
|
|
error: err.into(),
|
|
|
|
}))
|
|
|
|
}
|
|
|
|
|
|
|
|
fn create(&self, cluster: Arc<Cluster>, master: NodeId, nonce: Option<u64>, id: SessionId, creation_data: Option<AdminSessionCreationData>) -> Result<Arc<AdminSession>, Error> {
|
|
|
|
let nonce = self.core.check_session_nonce(&master, nonce)?;
|
|
|
|
Ok(Arc::new(match creation_data {
|
|
|
|
Some(AdminSessionCreationData::ShareAdd(version)) => {
|
|
|
|
AdminSession::ShareAdd(ShareAddSessionImpl::new(ShareAddSessionParams {
|
|
|
|
meta: ShareChangeSessionMeta {
|
|
|
|
id: id.clone(),
|
|
|
|
self_node_id: self.core.self_node_id.clone(),
|
|
|
|
master_node_id: master,
|
2018-05-01 15:02:14 +02:00
|
|
|
configured_nodes_count: cluster.configured_nodes_count(),
|
|
|
|
connected_nodes_count: cluster.connected_nodes_count(),
|
2017-11-02 15:33:11 +01:00
|
|
|
},
|
|
|
|
transport: ShareAddTransport::new(id.clone(), Some(version), nonce, cluster),
|
|
|
|
key_storage: self.core.key_storage.clone(),
|
|
|
|
nonce: nonce,
|
2018-01-10 11:33:45 +01:00
|
|
|
admin_public: Some(self.admin_public.clone().ok_or(Error::AccessDenied)?),
|
2017-11-02 15:33:11 +01:00
|
|
|
})?)
|
|
|
|
},
|
2018-01-10 11:33:45 +01:00
|
|
|
Some(AdminSessionCreationData::ServersSetChange(migration_id, new_nodes_set)) => {
|
|
|
|
let admin_public = self.servers_set_change_session_creator_connector.admin_public(migration_id.as_ref(), new_nodes_set)
|
|
|
|
.map_err(|_| Error::AccessDenied)?;
|
|
|
|
|
2017-11-02 15:33:11 +01:00
|
|
|
AdminSession::ServersSetChange(ServersSetChangeSessionImpl::new(ServersSetChangeSessionParams {
|
|
|
|
meta: ShareChangeSessionMeta {
|
|
|
|
id: id.clone(),
|
|
|
|
self_node_id: self.core.self_node_id.clone(),
|
|
|
|
master_node_id: master,
|
2018-05-01 15:02:14 +02:00
|
|
|
configured_nodes_count: cluster.configured_nodes_count(),
|
|
|
|
connected_nodes_count: cluster.connected_nodes_count(),
|
2017-11-02 15:33:11 +01:00
|
|
|
},
|
|
|
|
cluster: cluster.clone(),
|
|
|
|
key_storage: self.core.key_storage.clone(),
|
|
|
|
nonce: nonce,
|
|
|
|
all_nodes_set: cluster.nodes(),
|
|
|
|
admin_public: admin_public,
|
2018-01-10 11:33:45 +01:00
|
|
|
migration_id: migration_id,
|
2017-11-02 15:33:11 +01:00
|
|
|
})?)
|
|
|
|
},
|
|
|
|
None => unreachable!("expected to call with non-empty creation data; qed"),
|
|
|
|
}))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl IntoSessionId<SessionId> for Message {
|
|
|
|
fn into_session_id(&self) -> Result<SessionId, Error> {
|
|
|
|
match *self {
|
|
|
|
Message::Generation(ref message) => Ok(message.session_id().clone()),
|
|
|
|
Message::Encryption(ref message) => Ok(message.session_id().clone()),
|
|
|
|
Message::Decryption(_) => Err(Error::InvalidMessage),
|
2018-03-01 09:59:21 +01:00
|
|
|
Message::SchnorrSigning(_) => Err(Error::InvalidMessage),
|
|
|
|
Message::EcdsaSigning(_) => Err(Error::InvalidMessage),
|
2017-11-02 15:33:11 +01:00
|
|
|
Message::ServersSetChange(ref message) => Ok(message.session_id().clone()),
|
|
|
|
Message::ShareAdd(ref message) => Ok(message.session_id().clone()),
|
|
|
|
Message::KeyVersionNegotiation(_) => Err(Error::InvalidMessage),
|
|
|
|
Message::Cluster(_) => Err(Error::InvalidMessage),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
impl IntoSessionId<SessionIdWithSubSession> for Message {
|
|
|
|
fn into_session_id(&self) -> Result<SessionIdWithSubSession, Error> {
|
|
|
|
match *self {
|
|
|
|
Message::Generation(_) => Err(Error::InvalidMessage),
|
|
|
|
Message::Encryption(_) => Err(Error::InvalidMessage),
|
|
|
|
Message::Decryption(ref message) => Ok(SessionIdWithSubSession::new(message.session_id().clone(), message.sub_session_id().clone())),
|
2018-03-01 09:59:21 +01:00
|
|
|
Message::SchnorrSigning(ref message) => Ok(SessionIdWithSubSession::new(message.session_id().clone(), message.sub_session_id().clone())),
|
|
|
|
Message::EcdsaSigning(ref message) => Ok(SessionIdWithSubSession::new(message.session_id().clone(), message.sub_session_id().clone())),
|
2017-11-02 15:33:11 +01:00
|
|
|
Message::ServersSetChange(_) => Err(Error::InvalidMessage),
|
|
|
|
Message::ShareAdd(_) => Err(Error::InvalidMessage),
|
|
|
|
Message::KeyVersionNegotiation(ref message) => Ok(SessionIdWithSubSession::new(message.session_id().clone(), message.sub_session_id().clone())),
|
|
|
|
Message::Cluster(_) => Err(Error::InvalidMessage),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|