// Copyright 2015-2017 Parity Technologies (UK) Ltd. // This file is part of Parity. // Parity is free software: you can redistribute it and/or modify // it under the terms of the GNU General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // Parity is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU General Public License for more details. // You should have received a copy of the GNU General Public License // along with Parity. If not, see . use std::fmt; use std::collections::BTreeMap; use ethkey; use util; use key_server_cluster; /// Node id. pub type NodeId = ethkey::Public; /// Document address type. pub type DocumentAddress = util::H256; /// Document key type. pub type DocumentKey = util::Bytes; /// Encrypted key type. pub type DocumentEncryptedKey = util::Bytes; /// Request signature type. pub type RequestSignature = ethkey::Signature; /// Public key type. pub use ethkey::Public; #[derive(Debug, Clone, PartialEq)] #[binary] /// Secret store error pub enum Error { /// Bad signature is passed BadSignature, /// Access to resource is denied AccessDenied, /// Requested document not found DocumentNotFound, /// Database-related error Database(String), /// Internal error Internal(String), } #[derive(Debug, Clone)] #[binary] /// Secret store configuration pub struct NodeAddress { /// IP address. pub address: String, /// IP port. pub port: u16, } #[derive(Debug)] #[binary] /// Secret store configuration pub struct ServiceConfiguration { /// HTTP listener address. pub listener_address: NodeAddress, /// Data directory path for secret store pub data_path: String, /// Cluster configuration. pub cluster_config: ClusterConfiguration, } #[derive(Debug)] #[binary] /// Key server cluster configuration pub struct ClusterConfiguration { /// Number of threads reserved by cluster. pub threads: usize, /// Private key this node holds. pub self_private: Vec, // holds ethkey::Secret /// This node address. pub listener_address: NodeAddress, /// All cluster nodes addresses. pub nodes: BTreeMap, /// Allow outbound connections to 'higher' nodes. /// This is useful for tests, but slower a bit for production. pub allow_connecting_to_higher_nodes: bool, /// Encryption session configuration. pub encryption_config: EncryptionConfiguration, } #[derive(Clone, Debug)] #[binary] /// Encryption parameters. pub struct EncryptionConfiguration { /// Key check timeout. pub key_check_timeout_ms: u64, } #[derive(Clone, Debug, PartialEq)] #[binary] /// Shadow decryption result. pub struct DocumentEncryptedKeyShadow { /// Decrypted secret point. It is partially decrypted if shadow decrpytion was requested. pub decrypted_secret: ethkey::Public, /// Shared common point. pub common_point: Option, /// If shadow decryption was requested: shadow decryption coefficients, encrypted with requestor public. pub decrypt_shadows: Option>>, } impl fmt::Display for Error { fn fmt(&self, f: &mut fmt::Formatter) -> Result<(), fmt::Error> { match *self { Error::BadSignature => write!(f, "Bad signature"), Error::AccessDenied => write!(f, "Access dened"), Error::DocumentNotFound => write!(f, "Document not found"), Error::Database(ref msg) => write!(f, "Database error: {}", msg), Error::Internal(ref msg) => write!(f, "Internal error: {}", msg), } } } impl From for Error { fn from(err: ethkey::Error) -> Self { Error::Internal(err.into()) } } impl From for Error { fn from(err: key_server_cluster::Error) -> Self { match err { key_server_cluster::Error::AccessDenied => Error::AccessDenied, _ => Error::Internal(err.into()), } } } impl Into for Error { fn into(self) -> String { format!("{}", self) } }