146 lines
4.0 KiB
Rust
146 lines
4.0 KiB
Rust
// Copyright 2015-2017 Parity Technologies (UK) Ltd.
|
|
// This file is part of Parity.
|
|
|
|
// Parity is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
|
|
// Parity is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
// along with Parity. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
use std::fmt;
|
|
use std::collections::BTreeMap;
|
|
|
|
use ethkey;
|
|
use util;
|
|
use key_server_cluster;
|
|
|
|
/// Node id.
|
|
pub type NodeId = ethkey::Public;
|
|
/// Document address type.
|
|
pub type DocumentAddress = util::H256;
|
|
/// Document key type.
|
|
pub type DocumentKey = util::Bytes;
|
|
/// Encrypted key type.
|
|
pub type DocumentEncryptedKey = util::Bytes;
|
|
/// Request signature type.
|
|
pub type RequestSignature = ethkey::Signature;
|
|
/// Public key type.
|
|
pub use ethkey::Public;
|
|
|
|
#[derive(Debug, Clone, PartialEq)]
|
|
#[binary]
|
|
/// Secret store error
|
|
pub enum Error {
|
|
/// Bad signature is passed
|
|
BadSignature,
|
|
/// Access to resource is denied
|
|
AccessDenied,
|
|
/// Requested document not found
|
|
DocumentNotFound,
|
|
/// Database-related error
|
|
Database(String),
|
|
/// Internal error
|
|
Internal(String),
|
|
}
|
|
|
|
#[derive(Debug, Clone)]
|
|
#[binary]
|
|
/// Secret store configuration
|
|
pub struct NodeAddress {
|
|
/// IP address.
|
|
pub address: String,
|
|
/// IP port.
|
|
pub port: u16,
|
|
}
|
|
|
|
#[derive(Debug)]
|
|
#[binary]
|
|
/// Secret store configuration
|
|
pub struct ServiceConfiguration {
|
|
/// HTTP listener address.
|
|
pub listener_address: NodeAddress,
|
|
/// Data directory path for secret store
|
|
pub data_path: String,
|
|
/// Cluster configuration.
|
|
pub cluster_config: ClusterConfiguration,
|
|
}
|
|
|
|
#[derive(Debug)]
|
|
#[binary]
|
|
/// Key server cluster configuration
|
|
pub struct ClusterConfiguration {
|
|
/// Number of threads reserved by cluster.
|
|
pub threads: usize,
|
|
/// Private key this node holds.
|
|
pub self_private: Vec<u8>, // holds ethkey::Secret
|
|
/// This node address.
|
|
pub listener_address: NodeAddress,
|
|
/// All cluster nodes addresses.
|
|
pub nodes: BTreeMap<ethkey::Public, NodeAddress>,
|
|
/// Allow outbound connections to 'higher' nodes.
|
|
/// This is useful for tests, but slower a bit for production.
|
|
pub allow_connecting_to_higher_nodes: bool,
|
|
/// Encryption session configuration.
|
|
pub encryption_config: EncryptionConfiguration,
|
|
}
|
|
|
|
#[derive(Clone, Debug)]
|
|
#[binary]
|
|
/// Encryption parameters.
|
|
pub struct EncryptionConfiguration {
|
|
/// Key check timeout.
|
|
pub key_check_timeout_ms: u64,
|
|
}
|
|
|
|
#[derive(Clone, Debug, PartialEq)]
|
|
#[binary]
|
|
/// Shadow decryption result.
|
|
pub struct DocumentEncryptedKeyShadow {
|
|
/// Decrypted secret point. It is partially decrypted if shadow decrpytion was requested.
|
|
pub decrypted_secret: ethkey::Public,
|
|
/// Shared common point.
|
|
pub common_point: Option<ethkey::Public>,
|
|
/// If shadow decryption was requested: shadow decryption coefficients, encrypted with requestor public.
|
|
pub decrypt_shadows: Option<Vec<Vec<u8>>>,
|
|
}
|
|
|
|
impl fmt::Display for Error {
|
|
fn fmt(&self, f: &mut fmt::Formatter) -> Result<(), fmt::Error> {
|
|
match *self {
|
|
Error::BadSignature => write!(f, "Bad signature"),
|
|
Error::AccessDenied => write!(f, "Access dened"),
|
|
Error::DocumentNotFound => write!(f, "Document not found"),
|
|
Error::Database(ref msg) => write!(f, "Database error: {}", msg),
|
|
Error::Internal(ref msg) => write!(f, "Internal error: {}", msg),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl From<ethkey::Error> for Error {
|
|
fn from(err: ethkey::Error) -> Self {
|
|
Error::Internal(err.into())
|
|
}
|
|
}
|
|
|
|
impl From<key_server_cluster::Error> for Error {
|
|
fn from(err: key_server_cluster::Error) -> Self {
|
|
match err {
|
|
key_server_cluster::Error::AccessDenied => Error::AccessDenied,
|
|
_ => Error::Internal(err.into()),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl Into<String> for Error {
|
|
fn into(self) -> String {
|
|
format!("{}", self)
|
|
}
|
|
}
|