// Copyright 2015-2017 Parity Technologies (UK) Ltd. // This file is part of Parity. // Parity is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // Parity is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // You should have received a copy of the GNU General Public License // along with Parity. If not, see . use std::sync::Arc; use futures::{future, Future}; use parking_lot::Mutex; use ethkey::public_to_address; use ethcore::client::{Client, BlockChainClient, BlockId}; use native_contracts::SecretStoreAclStorage; use util::{H256, Address}; use types::all::{Error, ServerKeyId, Public}; const ACL_CHECKER_CONTRACT_REGISTRY_NAME: &'static str = "secretstore_acl_checker"; /// ACL storage of Secret Store pub trait AclStorage: Send + Sync { /// Check if requestor with `public` key can access document with hash `document` fn check(&self, public: &Public, document: &ServerKeyId) -> Result; } /// On-chain ACL storage implementation. pub struct OnChainAclStorage { /// Cached on-chain contract. contract: Mutex, } /// Cached on-chain ACL storage contract. struct CachedContract { /// Blockchain client. client: Arc, /// Hash of best block, when contract address has been read. best_block_hash: Option, /// Contract address. contract_addr: Option
, /// Contract at given address. contract: Option, } impl OnChainAclStorage { pub fn new(client: Arc) -> Self { OnChainAclStorage { contract: Mutex::new(CachedContract::new(client)), } } } impl AclStorage for OnChainAclStorage { fn check(&self, public: &Public, document: &ServerKeyId) -> Result { self.contract.lock().check(public, document) } } impl CachedContract { pub fn new(client: Arc) -> Self { CachedContract { client: client, best_block_hash: None, contract_addr: None, contract: None, } } pub fn check(&mut self, public: &Public, document: &ServerKeyId) -> Result { let new_best_block_hash = self.client.best_block_header().hash(); if self.best_block_hash.as_ref() != Some(&new_best_block_hash) { let new_contract_addr = self.client.registry_address(ACL_CHECKER_CONTRACT_REGISTRY_NAME.to_owned()); if self.contract_addr.as_ref() != new_contract_addr.as_ref() { self.contract = new_contract_addr.map(|contract_addr| { trace!(target: "secretstore", "Configuring for ACL checker contract from {}", contract_addr); SecretStoreAclStorage::new(contract_addr) }); self.contract_addr = new_contract_addr; } self.best_block_hash = Some(new_best_block_hash); } if let Some(contract) = self.contract.as_ref() { let address = public_to_address(&public); let do_call = |a, d| future::done(self.client.call_contract(BlockId::Latest, a, d)); contract.check_permissions(do_call, address, document.clone()) .map_err(|err| Error::Internal(err)) .wait() } else { Err(Error::Internal("ACL checker contract is not configured".to_owned())) } } } #[cfg(test)] pub mod tests { use std::collections::{HashMap, HashSet}; use parking_lot::RwLock; use types::all::{Error, ServerKeyId, Public}; use super::AclStorage; #[derive(Default, Debug)] /// Dummy ACL storage implementation pub struct DummyAclStorage { prohibited: RwLock>>, } impl DummyAclStorage { #[cfg(test)] /// Prohibit given requestor access to given document pub fn prohibit(&self, public: Public, document: ServerKeyId) { self.prohibited.write() .entry(public) .or_insert_with(Default::default) .insert(document); } } impl AclStorage for DummyAclStorage { fn check(&self, public: &Public, document: &ServerKeyId) -> Result { Ok(self.prohibited.read() .get(public) .map(|docs| !docs.contains(document)) .unwrap_or(true)) } } }