SecretStore: exclusive sessions

This commit is contained in:
Svyatoslav Nikolsky 2017-10-03 11:35:31 +03:00
parent f8d256dafa
commit fb38c20c16
4 changed files with 177 additions and 40 deletions

View File

@ -532,6 +532,14 @@ impl Cluster for SessionKeyGenerationTransport {
debug_assert!(self.other_nodes_ids.contains(to)); debug_assert!(self.other_nodes_ids.contains(to));
self.cluster.send(to, self.map_message(message)?) self.cluster.send(to, self.map_message(message)?)
} }
fn is_connected(&self, node: &NodeId) -> bool {
self.cluster.is_connected(node)
}
fn nodes(&self) -> BTreeSet<NodeId> {
self.cluster.nodes()
}
} }
impl SessionCore { impl SessionCore {

View File

@ -97,6 +97,10 @@ pub trait Cluster: Send + Sync {
fn broadcast(&self, message: Message) -> Result<(), Error>; fn broadcast(&self, message: Message) -> Result<(), Error>;
/// Send message to given node. /// Send message to given node.
fn send(&self, to: &NodeId, message: Message) -> Result<(), Error>; fn send(&self, to: &NodeId, message: Message) -> Result<(), Error>;
/// Is connected to given node?
fn is_connected(&self, node: &NodeId) -> bool;
/// Get a set of connected nodes.
fn nodes(&self) -> BTreeSet<NodeId>;
} }
/// Cluster initialization parameters. /// Cluster initialization parameters.
@ -652,7 +656,7 @@ impl ClusterCore {
}, },
Err(err) => { Err(err) => {
warn!(target: "secretstore_net", "{}: decryption session error '{}' when processing message {} from node {}", data.self_key_pair.public(), err, message, sender); warn!(target: "secretstore_net", "{}: decryption session error '{}' when processing message {} from node {}", data.self_key_pair.public(), err, message, sender);
let error_message = message::DecryptionSessionError { let error_message = message::DecryptionSessionError {
session: session_id.clone().into(), session: session_id.clone().into(),
sub_session: sub_session_id.clone().into(), sub_session: sub_session_id.clone().into(),
session_nonce: session_nonce, session_nonce: session_nonce,
@ -1287,14 +1291,6 @@ impl ClusterView {
})), })),
} }
} }
pub fn is_connected(&self, node: &NodeId) -> bool {
self.core.lock().nodes.contains(node)
}
pub fn nodes(&self) -> BTreeSet<NodeId> {
self.core.lock().nodes.clone()
}
} }
impl Cluster for ClusterView { impl Cluster for ClusterView {
@ -1315,6 +1311,14 @@ impl Cluster for ClusterView {
core.cluster.spawn(connection.send_message(message)); core.cluster.spawn(connection.send_message(message));
Ok(()) Ok(())
} }
fn is_connected(&self, node: &NodeId) -> bool {
self.core.lock().nodes.contains(node)
}
fn nodes(&self) -> BTreeSet<NodeId> {
self.core.lock().nodes.clone()
}
} }
impl ClusterClientImpl { impl ClusterClientImpl {
@ -1460,7 +1464,7 @@ fn make_socket_address(address: &str, port: u16) -> Result<SocketAddr, Error> {
pub mod tests { pub mod tests {
use std::sync::Arc; use std::sync::Arc;
use std::time; use std::time;
use std::collections::VecDeque; use std::collections::{BTreeSet, VecDeque};
use parking_lot::Mutex; use parking_lot::Mutex;
use tokio_core::reactor::Core; use tokio_core::reactor::Core;
use ethkey::{Random, Generator, Public}; use ethkey::{Random, Generator, Public};
@ -1517,6 +1521,15 @@ pub mod tests {
self.data.lock().messages.push_back((to.clone(), message)); self.data.lock().messages.push_back((to.clone(), message));
Ok(()) Ok(())
} }
fn is_connected(&self, node: &NodeId) -> bool {
let data = self.data.lock();
&self.id == node || data.nodes.contains(node)
}
fn nodes(&self) -> BTreeSet<NodeId> {
self.data.lock().nodes.iter().cloned().collect()
}
} }
pub fn loop_until<F>(core: &mut Core, timeout: time::Duration, predicate: F) where F: Fn() -> bool { pub fn loop_until<F>(core: &mut Core, timeout: time::Duration, predicate: F) where F: Fn() -> bool {

View File

@ -18,10 +18,10 @@ use std::time;
use std::sync::{Arc, Weak}; use std::sync::{Arc, Weak};
use std::sync::atomic::{AtomicBool, AtomicUsize, Ordering}; use std::sync::atomic::{AtomicBool, AtomicUsize, Ordering};
use std::collections::{VecDeque, BTreeSet, BTreeMap}; use std::collections::{VecDeque, BTreeSet, BTreeMap};
use parking_lot::RwLock; use parking_lot::{Mutex, RwLock};
use ethkey::{Public, Secret, Signature}; use ethkey::{Public, Secret, Signature};
use key_server_cluster::{Error, NodeId, SessionId, AclStorage, KeyStorage, DocumentKeyShare, EncryptedDocumentKeyShadow, SessionMeta}; use key_server_cluster::{Error, NodeId, SessionId, AclStorage, KeyStorage, DocumentKeyShare, EncryptedDocumentKeyShadow, SessionMeta};
use key_server_cluster::cluster::{Cluster, ClusterData, ClusterView, ClusterConfiguration}; use key_server_cluster::cluster::{Cluster, ClusterData, ClusterConfiguration};
use key_server_cluster::message::{self, Message, GenerationMessage, EncryptionMessage, DecryptionMessage, SigningMessage, use key_server_cluster::message::{self, Message, GenerationMessage, EncryptionMessage, DecryptionMessage, SigningMessage,
ShareAddMessage, ShareMoveMessage, ShareRemoveMessage, ServersSetChangeMessage}; ShareAddMessage, ShareMoveMessage, ShareRemoveMessage, ServersSetChangeMessage};
use key_server_cluster::generation_session::{Session as GenerationSession, SessionImpl as GenerationSessionImpl, use key_server_cluster::generation_session::{Session as GenerationSession, SessionImpl as GenerationSessionImpl,
@ -50,7 +50,7 @@ const SESSION_TIMEOUT_INTERVAL: u64 = 60;
lazy_static! { lazy_static! {
/// Servers set change session id (there could be at most 1 session => hardcoded id). /// Servers set change session id (there could be at most 1 session => hardcoded id).
static ref SERVERS_SET_CHANGE_SESSION_ID: SessionId = "10b7af423bb551d5dc8645db754163a2145d37d78d468fa7330435ed77064c1c206f4b71d62491dfb9f7dbeccc42a6c112c8bb507de7b4fcad8d646272b2c363" static ref SERVERS_SET_CHANGE_SESSION_ID: SessionId = "10b7af423bb551d5dc8645db754163a2145d37d78d468fa7330435ed77064c1c"
.parse() .parse()
.expect("hardcoded id should parse without errors; qed"); .expect("hardcoded id should parse without errors; qed");
} }
@ -119,6 +119,8 @@ pub struct ClusterSessions {
pub struct ClusterSessionsContainer<K, V, M> { pub struct ClusterSessionsContainer<K, V, M> {
/// Active sessions. /// Active sessions.
pub sessions: RwLock<BTreeMap<K, QueuedSession<V, M>>>, pub sessions: RwLock<BTreeMap<K, QueuedSession<V, M>>>,
/// Sessions container state.
container_state: Arc<Mutex<ClusterSessionsContainerState>>
} }
/// Session and its message queue. /// Session and its message queue.
@ -126,7 +128,7 @@ pub struct QueuedSession<V, M> {
/// Session master. /// Session master.
pub master: NodeId, pub master: NodeId,
/// Cluster view. /// Cluster view.
pub cluster_view: Arc<ClusterView>, pub cluster_view: Arc<Cluster>,
/// Last received message time. /// Last received message time.
pub last_message_time: time::Instant, pub last_message_time: time::Instant,
/// Generation session. /// Generation session.
@ -135,6 +137,17 @@ pub struct QueuedSession<V, M> {
pub queue: VecDeque<(NodeId, M)>, pub queue: VecDeque<(NodeId, M)>,
} }
/// Cluster sessions container state.
#[derive(Debug, Clone, Copy, PartialEq)]
pub enum ClusterSessionsContainerState {
/// There's no active sessions => any session can be started.
Idle,
/// There are active sessions => exclusive session can't be started right now.
Active(usize),
/// Exclusive session is active => can't start any other sessions.
Exclusive,
}
/// Generation session implementation, which removes session from cluster on drop. /// Generation session implementation, which removes session from cluster on drop.
pub struct GenerationSessionWrapper { pub struct GenerationSessionWrapper {
/// Wrapped session. /// Wrapped session.
@ -188,17 +201,18 @@ pub struct AdminSessionWrapper {
impl ClusterSessions { impl ClusterSessions {
/// Create new cluster sessions container. /// Create new cluster sessions container.
pub fn new(config: &ClusterConfiguration) -> Self { pub fn new(config: &ClusterConfiguration) -> Self {
let container_state = Arc::new(Mutex::new(ClusterSessionsContainerState::Idle));
ClusterSessions { ClusterSessions {
self_node_id: config.self_key_pair.public().clone(), self_node_id: config.self_key_pair.public().clone(),
nodes: config.key_server_set.get().keys().cloned().collect(), nodes: config.key_server_set.get().keys().cloned().collect(),
acl_storage: config.acl_storage.clone(), acl_storage: config.acl_storage.clone(),
key_storage: config.key_storage.clone(), key_storage: config.key_storage.clone(),
admin_public: config.admin_public.clone(), admin_public: config.admin_public.clone(),
generation_sessions: ClusterSessionsContainer::new(), generation_sessions: ClusterSessionsContainer::new(container_state.clone()),
encryption_sessions: ClusterSessionsContainer::new(), encryption_sessions: ClusterSessionsContainer::new(container_state.clone()),
decryption_sessions: ClusterSessionsContainer::new(), decryption_sessions: ClusterSessionsContainer::new(container_state.clone()),
signing_sessions: ClusterSessionsContainer::new(), signing_sessions: ClusterSessionsContainer::new(container_state.clone()),
admin_sessions: ClusterSessionsContainer::new(), admin_sessions: ClusterSessionsContainer::new(container_state),
make_faulty_generation_sessions: AtomicBool::new(false), make_faulty_generation_sessions: AtomicBool::new(false),
session_counter: AtomicUsize::new(0), session_counter: AtomicUsize::new(0),
max_nonce: RwLock::new(BTreeMap::new()), max_nonce: RwLock::new(BTreeMap::new()),
@ -211,7 +225,7 @@ impl ClusterSessions {
} }
/// Create new generation session. /// Create new generation session.
pub fn new_generation_session(&self, master: NodeId, session_id: SessionId, nonce: Option<u64>, cluster: Arc<ClusterView>) -> Result<Arc<GenerationSessionImpl>, Error> { pub fn new_generation_session(&self, master: NodeId, session_id: SessionId, nonce: Option<u64>, cluster: Arc<Cluster>) -> Result<Arc<GenerationSessionImpl>, Error> {
// check that there's no finished encryption session with the same id // check that there's no finished encryption session with the same id
if self.key_storage.contains(&session_id) { if self.key_storage.contains(&session_id) {
return Err(Error::DuplicateSessionId); return Err(Error::DuplicateSessionId);
@ -225,7 +239,7 @@ impl ClusterSessions {
// check that there's no active encryption session with the same id // check that there's no active encryption session with the same id
let nonce = self.check_session_nonce(&master, nonce)?; let nonce = self.check_session_nonce(&master, nonce)?;
self.generation_sessions.insert(master, session_id, cluster.clone(), move || self.generation_sessions.insert(master, session_id, cluster.clone(), false, move ||
Ok(GenerationSessionImpl::new(GenerationSessionParams { Ok(GenerationSessionImpl::new(GenerationSessionParams {
id: session_id.clone(), id: session_id.clone(),
self_node_id: self.self_node_id.clone(), self_node_id: self.self_node_id.clone(),
@ -254,11 +268,11 @@ impl ClusterSessions {
} }
/// Create new encryption session. /// Create new encryption session.
pub fn new_encryption_session(&self, master: NodeId, session_id: SessionId, nonce: Option<u64>, cluster: Arc<ClusterView>) -> Result<Arc<EncryptionSessionImpl>, Error> { pub fn new_encryption_session(&self, master: NodeId, session_id: SessionId, nonce: Option<u64>, cluster: Arc<Cluster>) -> Result<Arc<EncryptionSessionImpl>, Error> {
let encrypted_data = self.read_key_share(&session_id, &cluster)?; let encrypted_data = self.read_key_share(&session_id, &cluster)?;
let nonce = self.check_session_nonce(&master, nonce)?; let nonce = self.check_session_nonce(&master, nonce)?;
self.encryption_sessions.insert(master, session_id, cluster.clone(), move || EncryptionSessionImpl::new(EncryptionSessionParams { self.encryption_sessions.insert(master, session_id, cluster.clone(), false, move || EncryptionSessionImpl::new(EncryptionSessionParams {
id: session_id.clone(), id: session_id.clone(),
self_node_id: self.self_node_id.clone(), self_node_id: self.self_node_id.clone(),
encrypted_data: encrypted_data, encrypted_data: encrypted_data,
@ -281,12 +295,12 @@ impl ClusterSessions {
} }
/// Create new decryption session. /// Create new decryption session.
pub fn new_decryption_session(&self, master: NodeId, session_id: SessionId, sub_session_id: Secret, nonce: Option<u64>, cluster: Arc<ClusterView>, requester_signature: Option<Signature>) -> Result<Arc<DecryptionSessionImpl>, Error> { pub fn new_decryption_session(&self, master: NodeId, session_id: SessionId, sub_session_id: Secret, nonce: Option<u64>, cluster: Arc<Cluster>, requester_signature: Option<Signature>) -> Result<Arc<DecryptionSessionImpl>, Error> {
let session_id = DecryptionSessionId::new(session_id, sub_session_id); let session_id = DecryptionSessionId::new(session_id, sub_session_id);
let encrypted_data = self.read_key_share(&session_id.id, &cluster)?; let encrypted_data = self.read_key_share(&session_id.id, &cluster)?;
let nonce = self.check_session_nonce(&master, nonce)?; let nonce = self.check_session_nonce(&master, nonce)?;
self.decryption_sessions.insert(master, session_id.clone(), cluster.clone(), move || DecryptionSessionImpl::new(DecryptionSessionParams { self.decryption_sessions.insert(master, session_id.clone(), cluster.clone(), false, move || DecryptionSessionImpl::new(DecryptionSessionParams {
meta: SessionMeta { meta: SessionMeta {
id: session_id.id, id: session_id.id,
self_node_id: self.self_node_id.clone(), self_node_id: self.self_node_id.clone(),
@ -320,12 +334,12 @@ impl ClusterSessions {
} }
/// Create new signing session. /// Create new signing session.
pub fn new_signing_session(&self, master: NodeId, session_id: SessionId, sub_session_id: Secret, nonce: Option<u64>, cluster: Arc<ClusterView>, requester_signature: Option<Signature>) -> Result<Arc<SigningSessionImpl>, Error> { pub fn new_signing_session(&self, master: NodeId, session_id: SessionId, sub_session_id: Secret, nonce: Option<u64>, cluster: Arc<Cluster>, requester_signature: Option<Signature>) -> Result<Arc<SigningSessionImpl>, Error> {
let session_id = SigningSessionId::new(session_id, sub_session_id); let session_id = SigningSessionId::new(session_id, sub_session_id);
let encrypted_data = self.read_key_share(&session_id.id, &cluster)?; let encrypted_data = self.read_key_share(&session_id.id, &cluster)?;
let nonce = self.check_session_nonce(&master, nonce)?; let nonce = self.check_session_nonce(&master, nonce)?;
self.signing_sessions.insert(master, session_id.clone(), cluster.clone(), move || SigningSessionImpl::new(SigningSessionParams { self.signing_sessions.insert(master, session_id.clone(), cluster.clone(), false, move || SigningSessionImpl::new(SigningSessionParams {
meta: SessionMeta { meta: SessionMeta {
id: session_id.id, id: session_id.id,
self_node_id: self.self_node_id.clone(), self_node_id: self.self_node_id.clone(),
@ -359,11 +373,11 @@ impl ClusterSessions {
} }
/// Create new share add session. /// Create new share add session.
pub fn new_share_add_session(&self, master: NodeId, session_id: SessionId, nonce: Option<u64>, cluster: Arc<ClusterView>) -> Result<Arc<AdminSession>, Error> { pub fn new_share_add_session(&self, master: NodeId, session_id: SessionId, nonce: Option<u64>, cluster: Arc<Cluster>) -> Result<Arc<AdminSession>, Error> {
let nonce = self.check_session_nonce(&master, nonce)?; let nonce = self.check_session_nonce(&master, nonce)?;
let admin_public = self.admin_public.clone().ok_or(Error::AccessDenied)?; let admin_public = self.admin_public.clone().ok_or(Error::AccessDenied)?;
self.admin_sessions.insert(master, session_id.clone(), cluster.clone(), move || ShareAddSessionImpl::new(ShareAddSessionParams { self.admin_sessions.insert(master, session_id.clone(), cluster.clone(), false, move || ShareAddSessionImpl::new(ShareAddSessionParams {
meta: ShareChangeSessionMeta { meta: ShareChangeSessionMeta {
id: session_id, id: session_id,
self_node_id: self.self_node_id.clone(), self_node_id: self.self_node_id.clone(),
@ -389,11 +403,11 @@ impl ClusterSessions {
} }
/// Create new share move session. /// Create new share move session.
pub fn new_share_move_session(&self, master: NodeId, session_id: SessionId, nonce: Option<u64>, cluster: Arc<ClusterView>) -> Result<Arc<AdminSession>, Error> { pub fn new_share_move_session(&self, master: NodeId, session_id: SessionId, nonce: Option<u64>, cluster: Arc<Cluster>) -> Result<Arc<AdminSession>, Error> {
let nonce = self.check_session_nonce(&master, nonce)?; let nonce = self.check_session_nonce(&master, nonce)?;
let admin_public = self.admin_public.clone().ok_or(Error::AccessDenied)?; let admin_public = self.admin_public.clone().ok_or(Error::AccessDenied)?;
self.admin_sessions.insert(master, session_id.clone(), cluster.clone(), move || ShareMoveSessionImpl::new(ShareMoveSessionParams { self.admin_sessions.insert(master, session_id.clone(), cluster.clone(), false, move || ShareMoveSessionImpl::new(ShareMoveSessionParams {
meta: ShareChangeSessionMeta { meta: ShareChangeSessionMeta {
id: session_id, id: session_id,
self_node_id: self.self_node_id.clone(), self_node_id: self.self_node_id.clone(),
@ -419,11 +433,11 @@ impl ClusterSessions {
} }
/// Create new share remove session. /// Create new share remove session.
pub fn new_share_remove_session(&self, master: NodeId, session_id: SessionId, nonce: Option<u64>, cluster: Arc<ClusterView>) -> Result<Arc<AdminSession>, Error> { pub fn new_share_remove_session(&self, master: NodeId, session_id: SessionId, nonce: Option<u64>, cluster: Arc<Cluster>) -> Result<Arc<AdminSession>, Error> {
let nonce = self.check_session_nonce(&master, nonce)?; let nonce = self.check_session_nonce(&master, nonce)?;
let admin_public = self.admin_public.clone().ok_or(Error::AccessDenied)?; let admin_public = self.admin_public.clone().ok_or(Error::AccessDenied)?;
self.admin_sessions.insert(master, session_id.clone(), cluster.clone(), move || ShareRemoveSessionImpl::new(ShareRemoveSessionParams { self.admin_sessions.insert(master, session_id.clone(), cluster.clone(), false, move || ShareRemoveSessionImpl::new(ShareRemoveSessionParams {
meta: ShareChangeSessionMeta { meta: ShareChangeSessionMeta {
id: session_id, id: session_id,
self_node_id: self.self_node_id.clone(), self_node_id: self.self_node_id.clone(),
@ -449,7 +463,7 @@ impl ClusterSessions {
} }
/// Create new servers set change session. /// Create new servers set change session.
pub fn new_servers_set_change_session(&self, master: NodeId, session_id: Option<SessionId>, nonce: Option<u64>, cluster: Arc<ClusterView>, all_nodes_set: BTreeSet<NodeId>) -> Result<Arc<AdminSession>, Error> { pub fn new_servers_set_change_session(&self, master: NodeId, session_id: Option<SessionId>, nonce: Option<u64>, cluster: Arc<Cluster>, all_nodes_set: BTreeSet<NodeId>) -> Result<Arc<AdminSession>, Error> {
// TODO: check if there's no other active sessions + do not allow to start other sessions when this session is active // TODO: check if there's no other active sessions + do not allow to start other sessions when this session is active
let session_id = match session_id { let session_id = match session_id {
Some(session_id) => if session_id == *SERVERS_SET_CHANGE_SESSION_ID { Some(session_id) => if session_id == *SERVERS_SET_CHANGE_SESSION_ID {
@ -462,7 +476,7 @@ impl ClusterSessions {
let nonce = self.check_session_nonce(&master, nonce)?; let nonce = self.check_session_nonce(&master, nonce)?;
let admin_public = self.admin_public.clone().ok_or(Error::AccessDenied)?; let admin_public = self.admin_public.clone().ok_or(Error::AccessDenied)?;
self.admin_sessions.insert(master, session_id.clone(), cluster.clone(), move || ServersSetChangeSessionImpl::new(ServersSetChangeSessionParams { self.admin_sessions.insert(master, session_id.clone(), cluster.clone(), true, move || ServersSetChangeSessionImpl::new(ServersSetChangeSessionParams {
meta: ShareChangeSessionMeta { meta: ShareChangeSessionMeta {
id: session_id, id: session_id,
self_node_id: self.self_node_id.clone(), self_node_id: self.self_node_id.clone(),
@ -511,7 +525,7 @@ impl ClusterSessions {
} }
/// Read key share && remove disconnected nodes. /// Read key share && remove disconnected nodes.
fn read_key_share(&self, key_id: &SessionId, cluster: &Arc<ClusterView>) -> Result<DocumentKeyShare, Error> { fn read_key_share(&self, key_id: &SessionId, cluster: &Arc<Cluster>) -> Result<DocumentKeyShare, Error> {
let mut encrypted_data = self.key_storage.get(key_id).map_err(|e| Error::KeyStorage(e.into()))?; let mut encrypted_data = self.key_storage.get(key_id).map_err(|e| Error::KeyStorage(e.into()))?;
// some of nodes, which were encrypting secret may be down // some of nodes, which were encrypting secret may be down
@ -540,9 +554,10 @@ impl ClusterSessions {
} }
impl<K, V, M> ClusterSessionsContainer<K, V, M> where K: Clone + Ord, V: ClusterSession { impl<K, V, M> ClusterSessionsContainer<K, V, M> where K: Clone + Ord, V: ClusterSession {
pub fn new() -> Self { pub fn new(container_state: Arc<Mutex<ClusterSessionsContainerState>>) -> Self {
ClusterSessionsContainer { ClusterSessionsContainer {
sessions: RwLock::new(BTreeMap::new()), sessions: RwLock::new(BTreeMap::new()),
container_state: container_state,
} }
} }
@ -554,13 +569,18 @@ impl<K, V, M> ClusterSessionsContainer<K, V, M> where K: Clone + Ord, V: Cluster
self.sessions.read().get(session_id).map(|s| s.session.clone()) self.sessions.read().get(session_id).map(|s| s.session.clone())
} }
pub fn insert<F: FnOnce() -> Result<V, Error>>(&self, master: NodeId, session_id: K, cluster: Arc<ClusterView>, session: F) -> Result<Arc<V>, Error> { pub fn insert<F: FnOnce() -> Result<V, Error>>(&self, master: NodeId, session_id: K, cluster: Arc<Cluster>, is_exclusive_session: bool, session: F) -> Result<Arc<V>, Error> {
let mut sessions = self.sessions.write(); let mut sessions = self.sessions.write();
if sessions.contains_key(&session_id) { if sessions.contains_key(&session_id) {
return Err(Error::DuplicateSessionId); return Err(Error::DuplicateSessionId);
} }
// create session
let session = Arc::new(session()?); let session = Arc::new(session()?);
// check if session can be started
self.container_state.lock().on_session_starting(is_exclusive_session)?;
// insert session
let queued_session = QueuedSession { let queued_session = QueuedSession {
master: master, master: master,
cluster_view: cluster, cluster_view: cluster,
@ -573,7 +593,9 @@ impl<K, V, M> ClusterSessionsContainer<K, V, M> where K: Clone + Ord, V: Cluster
} }
pub fn remove(&self, session_id: &K) { pub fn remove(&self, session_id: &K) {
self.sessions.write().remove(session_id); if self.sessions.write().remove(session_id).is_some() {
self.container_state.lock().on_session_completed();
}
} }
pub fn enqueue_message(&self, session_id: &K, sender: NodeId, message: M, is_queued_message: bool) { pub fn enqueue_message(&self, session_id: &K, sender: NodeId, message: M, is_queued_message: bool) {
@ -621,6 +643,45 @@ impl<K, V, M> ClusterSessionsContainer<K, V, M> where K: Clone + Ord, V: Cluster
} }
} }
impl ClusterSessionsContainerState {
/// When session is starting.
pub fn on_session_starting(&mut self, is_exclusive_session: bool) -> Result<(), Error> {
match *self {
ClusterSessionsContainerState::Idle if is_exclusive_session => {
::std::mem::replace(self, ClusterSessionsContainerState::Exclusive);
},
ClusterSessionsContainerState::Idle => {
::std::mem::replace(self, ClusterSessionsContainerState::Active(1));
},
ClusterSessionsContainerState::Active(_) if is_exclusive_session =>
return Err(Error::HasActiveSessions),
ClusterSessionsContainerState::Active(sessions_count) => {
::std::mem::replace(self, ClusterSessionsContainerState::Active(sessions_count + 1));
},
ClusterSessionsContainerState::Exclusive =>
return Err(Error::ExclusiveSessionActive),
}
Ok(())
}
/// When session is completed.
pub fn on_session_completed(&mut self) {
match *self {
ClusterSessionsContainerState::Idle =>
unreachable!("idle means that there are no active sessions; on_session_completed is only called once after active session is completed; qed"),
ClusterSessionsContainerState::Active(sessions_count) if sessions_count == 1 => {
::std::mem::replace(self, ClusterSessionsContainerState::Idle);
},
ClusterSessionsContainerState::Active(sessions_count) => {
::std::mem::replace(self, ClusterSessionsContainerState::Active(sessions_count - 1));
}
ClusterSessionsContainerState::Exclusive => {
::std::mem::replace(self, ClusterSessionsContainerState::Idle);
},
}
}
}
impl AdminSession { impl AdminSession {
pub fn as_share_add(&self) -> Option<&ShareAddSessionImpl<ShareAddTransport>> { pub fn as_share_add(&self) -> Option<&ShareAddSessionImpl<ShareAddTransport>> {
match *self { match *self {
@ -841,3 +902,53 @@ impl Drop for AdminSessionWrapper {
} }
} }
} }
#[cfg(test)]
mod tests {
use std::sync::Arc;
use std::collections::BTreeSet;
use ethkey::{Random, Generator};
use key_server_cluster::{Error, DummyAclStorage, DummyKeyStorage, MapKeyServerSet, PlainNodeKeyPair};
use key_server_cluster::cluster::ClusterConfiguration;
use key_server_cluster::cluster::tests::DummyCluster;
use super::ClusterSessions;
pub fn make_cluster_sessions() -> ClusterSessions {
let key_pair = Random.generate().unwrap();
let config = ClusterConfiguration {
threads: 1,
self_key_pair: Arc::new(PlainNodeKeyPair::new(key_pair.clone())),
listen_address: ("127.0.0.1".to_owned(), 100_u16),
key_server_set: Arc::new(MapKeyServerSet::new(vec![(key_pair.public().clone(), format!("127.0.0.1:{}", 100).parse().unwrap())].into_iter().collect())),
allow_connecting_to_higher_nodes: false,
key_storage: Arc::new(DummyKeyStorage::default()),
acl_storage: Arc::new(DummyAclStorage::default()),
admin_public: Some(Random.generate().unwrap().public().clone()),
};
ClusterSessions::new(&config)
}
#[test]
fn cluster_session_cannot_be_started_if_exclusive_session_is_active() {
let sessions = make_cluster_sessions();
sessions.new_generation_session(Default::default(), Default::default(), Some(1), Arc::new(DummyCluster::new(sessions.self_node_id.clone()))).unwrap();
match sessions.new_servers_set_change_session(Default::default(), None, Some(1), Arc::new(DummyCluster::new(sessions.self_node_id.clone())), BTreeSet::new()) {
Err(Error::HasActiveSessions) => (),
Err(e) => unreachable!(format!("{}", e)),
Ok(_) => unreachable!("OK"),
}
}
#[test]
fn exclusive_session_cannot_be_started_if_other_session_is_active() {
let sessions = make_cluster_sessions();
sessions.new_servers_set_change_session(Default::default(), None, Some(1), Arc::new(DummyCluster::new(sessions.self_node_id.clone())), BTreeSet::new()).unwrap();
match sessions.new_generation_session(Default::default(), Default::default(), Some(1), Arc::new(DummyCluster::new(sessions.self_node_id.clone()))) {
Err(Error::ExclusiveSessionActive) => (),
Err(e) => unreachable!(format!("{}", e)),
Ok(_) => unreachable!("OK"),
}
}
}

View File

@ -107,6 +107,10 @@ pub enum Error {
ConsensusUnreachable, ConsensusUnreachable,
/// Acl storage error. /// Acl storage error.
AccessDenied, AccessDenied,
/// Can't start session, because exclusive session is active.
ExclusiveSessionActive,
/// Can't start exclusive session, because there are other active sessions.
HasActiveSessions,
} }
impl From<ethkey::Error> for Error { impl From<ethkey::Error> for Error {
@ -152,6 +156,8 @@ impl fmt::Display for Error {
Error::KeyStorage(ref e) => write!(f, "key storage error {}", e), Error::KeyStorage(ref e) => write!(f, "key storage error {}", e),
Error::ConsensusUnreachable => write!(f, "Consensus unreachable"), Error::ConsensusUnreachable => write!(f, "Consensus unreachable"),
Error::AccessDenied => write!(f, "Access denied"), Error::AccessDenied => write!(f, "Access denied"),
Error::ExclusiveSessionActive => write!(f, "Exclusive session active"),
Error::HasActiveSessions => write!(f, "Unable to start exclusive session"),
} }
} }
} }
@ -175,7 +181,6 @@ pub use self::client_sessions::decryption_session;
pub use self::client_sessions::encryption_session; pub use self::client_sessions::encryption_session;
pub use self::client_sessions::generation_session; pub use self::client_sessions::generation_session;
pub use self::client_sessions::signing_session; pub use self::client_sessions::signing_session;
mod cluster; mod cluster;
mod cluster_sessions; mod cluster_sessions;
mod io; mod io;