// Copyright 2015-2019 Parity Technologies (UK) Ltd.
// This file is part of Parity Ethereum.
// Parity Ethereum is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
// Parity Ethereum is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
// You should have received a copy of the GNU General Public License
// along with Parity Ethereum. If not, see .
use std::fmt;
use std::ops::Deref;
use rustc_hex::{self, FromHex};
use serde::{Serialize, Deserialize, Serializer, Deserializer};
use serde::de::{Visitor, Error as SerdeError};
use ethkey::{Public, Secret, Signature};
use ethereum_types::{H160, H256};
use bytes::Bytes;
use types::Requester;
trait ToHex {
fn to_hex(&self) -> String;
}
impl ToHex for Bytes {
fn to_hex(&self) -> String {
format!("0x{}", rustc_hex::ToHex::to_hex(&self[..]))
}
}
impl ToHex for Signature {
fn to_hex(&self) -> String {
format!("0x{}", self)
}
}
impl ToHex for Secret {
fn to_hex(&self) -> String {
format!("0x{}", rustc_hex::ToHex::to_hex(self))
}
}
macro_rules! impl_to_hex {
($name: ident) => (
impl ToHex for $name {
fn to_hex(&self) -> String {
format!("{:#x}", self)
}
}
);
}
macro_rules! impl_bytes_deserialize {
($name: ident, $value: expr, true) => {
$value[2..].from_hex().map($name).map_err(SerdeError::custom)
};
($name: ident, $value: expr, false) => {
$value[2..].parse().map($name).map_err(SerdeError::custom)
}
}
macro_rules! impl_bytes {
($name: ident, $other: ident, $from_hex: ident, ($($trait: ident),*)) => {
#[derive(Clone, Debug, PartialEq, Eq, $($trait,)*)]
pub struct $name(pub $other);
impl From for $name where $other: From {
fn from(s: T) -> $name {
$name(s.into())
}
}
impl Into<$other> for $name {
fn into(self) -> $other {
self.0
}
}
impl Deref for $name {
type Target = $other;
fn deref(&self) -> &$other {
&self.0
}
}
impl Serialize for $name {
fn serialize(&self, serializer: S) -> Result where S: Serializer {
serializer.serialize_str(self.0.to_hex().as_ref())
}
}
impl<'a> Deserialize<'a> for $name {
fn deserialize(deserializer: D) -> Result where D: Deserializer<'a> {
struct HexBytesVisitor;
impl<'b> Visitor<'b> for HexBytesVisitor {
type Value = $name;
fn expecting(&self, formatter: &mut fmt::Formatter) -> fmt::Result {
write!(formatter, "a hex-encoded bytes string")
}
fn visit_str(self, value: &str) -> Result where E: SerdeError {
if value.len() >= 2 && &value[0..2] == "0x" && value.len() & 1 == 0 {
impl_bytes_deserialize!($name, value, $from_hex)
} else {
Err(SerdeError::custom("invalid format"))
}
}
fn visit_string(self, value: String) -> Result where E: SerdeError {
self.visit_str(value.as_ref())
}
}
deserializer.deserialize_any(HexBytesVisitor)
}
}
}
}
/// Serializable message hash.
pub type SerializableMessageHash = SerializableH256;
/// Serializable address;
pub type SerializableAddress = SerializableH160;
impl_to_hex!(H256);
impl_to_hex!(H160);
impl_to_hex!(Public);
impl_bytes!(SerializableBytes, Bytes, true, (Default));
impl_bytes!(SerializableH256, H256, false, (Default, PartialOrd, Ord));
impl_bytes!(SerializableH160, H160, false, (Default));
impl_bytes!(SerializablePublic, Public, false, (Default, PartialOrd, Ord));
impl_bytes!(SerializableSecret, Secret, false, ());
impl_bytes!(SerializableSignature, Signature, false, ());
/// Serializable shadow decryption result.
#[derive(Clone, Debug, Serialize, Deserialize)]
pub struct SerializableEncryptedDocumentKeyShadow {
/// Decrypted secret point. It is partially decrypted if shadow decryption was requested.
pub decrypted_secret: SerializablePublic,
/// Shared common point.
pub common_point: SerializablePublic,
/// If shadow decryption was requested: shadow decryption coefficients, encrypted with requestor public.
pub decrypt_shadows: Vec,
}
/// Serializable requester identification data.
#[derive(Clone, Debug, Serialize, Deserialize)]
pub enum SerializableRequester {
/// Requested with server key id signature.
Signature(SerializableSignature),
/// Requested with public key.
Public(SerializablePublic),
/// Requested with verified address.
Address(SerializableAddress),
}
impl From for Requester {
fn from(requester: SerializableRequester) -> Requester {
match requester {
SerializableRequester::Signature(signature) => Requester::Signature(signature.into()),
SerializableRequester::Public(public) => Requester::Public(public.into()),
SerializableRequester::Address(address) => Requester::Address(address.into()),
}
}
}
impl From for SerializableRequester {
fn from(requester: Requester) -> SerializableRequester {
match requester {
Requester::Signature(signature) => SerializableRequester::Signature(signature.into()),
Requester::Public(public) => SerializableRequester::Public(public.into()),
Requester::Address(address) => SerializableRequester::Address(address.into()),
}
}
}
#[cfg(test)]
mod tests {
use serde_json;
use super::*;
use std::str::FromStr;
macro_rules! do_test {
($value: expr, $expected: expr, $expected_type: ident) => (
let serialized = serde_json::to_string(&$value).unwrap();
assert_eq!(serialized, $expected);
let deserialized: $expected_type = serde_json::from_str(&serialized).unwrap();
assert_eq!(deserialized, $value);
);
}
#[test]
fn serialize_and_deserialize_bytes() {
do_test!(SerializableBytes(vec![1, 2, 3, 4]), "\"0x01020304\"".to_owned(), SerializableBytes);
}
#[test]
fn serialize_and_deserialize_h256() {
let s = "5a39ed1020c04d4d84539975b893a4e7c53eab6c2965db8bc3468093a31bc5ae";
let h256 = SerializableH256(H256::from_str(s).unwrap());
do_test!(h256, format!("\"0x{}\"", s), SerializableH256);
}
#[test]
fn serialize_and_deserialize_h160() {
let s = "c6d9d2cd449a754c494264e1809c50e34d64562b";
let h160 = SerializableH160(H160::from_str(s).unwrap());
do_test!(h160, format!("\"0x{}\"", s), SerializableH160);
}
#[test]
fn serialize_and_deserialize_public() {
let s = "cac6c205eb06c8308d65156ff6c862c62b000b8ead121a4455a8ddeff7248128d895692136f240d5d1614dc7cc4147b1bd584bd617e30560bb872064d09ea325";
let public = SerializablePublic(s.parse().unwrap());
do_test!(public, format!("\"0x{}\"", s), SerializablePublic);
}
#[test]
fn serialize_and_deserialize_secret() {
let s = "5a39ed1020c04d4d84539975b893a4e7c53eab6c2965db8bc3468093a31bc5ae";
let secret = SerializableSecret(Secret::from(s));
do_test!(secret, format!("\"0x{}\"", s), SerializableSecret);
}
#[test]
fn serialize_and_deserialize_signature() {
let raw_r = "afafafafafafafafafafafbcbcbcbcbcbcbcbcbcbeeeeeeeeeeeeedddddddddd";
let raw_s = "5a39ed1020c04d4d84539975b893a4e7c53eab6c2965db8bc3468093a31bc5ae";
let r = H256::from_str(raw_r).unwrap();
let s = H256::from_str(raw_s).unwrap();
let v = 42u8;
let public = SerializableSignature(Signature::from_rsv(&r, &s, v));
do_test!(public, format!("\"0x{}{}{:x}\"", raw_r, raw_s, v), SerializableSignature);
}
}