quorum/core/types/permissions_cache.go

432 lines
9.1 KiB
Go
Raw Normal View History

package types
import (
"github.com/ethereum/go-ethereum/common"
"github.com/hashicorp/golang-lru"
"math/big"
"strings"
2018-11-12 00:16:56 -08:00
"sync"
)
type AccessType uint8
const (
ReadOnly AccessType = iota
Transact
ContractDeploy
2019-02-11 17:54:13 -08:00
FullAccess
)
type OrgStatus uint8
const (
OrgPendingApproval OrgStatus = iota + 1
2019-03-28 21:28:11 -07:00
OrgApproved
OrgPendingSuspension
OrgSuspended
OrgRevokeSuspension
)
type OrgInfo struct {
OrgId string `json:"orgId"`
FullOrgId string `json:"fullOrgId"`
ParentOrgId string `json:"parentOrgId"`
UltimateParent string `json:"ultimateParent"`
Level *big.Int `json:"level"`
SubOrgList []string `json:"subOrgList"`
Status OrgStatus `json:"status"`
}
type NodeStatus uint8
const (
2019-03-28 21:28:11 -07:00
NodePendingApproval NodeStatus = iota + 1
NodeApproved
2019-03-28 21:28:11 -07:00
NodeDeactivated
NodeActivated
NodeBlackListed
)
2019-03-28 21:28:11 -07:00
type AcctStatus uint8
const (
AcctPendingApproval AcctStatus = iota + 1
AcctActive
AcctInactive
AcctSuspended
AcctBlacklisted
2019-03-28 21:28:11 -07:00
)
type NodeInfo struct {
OrgId string `json:"orgId"`
Url string `json:"url"`
Status NodeStatus `json:"status"`
}
type RoleInfo struct {
OrgId string `json:"orgId"`
RoleId string `json:"roleId"`
IsVoter bool `json:"isVoter"`
Access AccessType `json:"access"`
Active bool `json:"active"`
}
type AccountInfo struct {
OrgId string `json:"orgId"`
RoleId string `json:"roleId"`
AcctId common.Address `json:"acctId"`
IsOrgAdmin bool `json:"isOrgAdmin"`
Status AcctStatus `json:"status"`
}
type OrgDetailInfo struct {
NodeList []NodeInfo `json:"nodeList"`
RoleList []RoleInfo `json:"roleList"`
AcctList []AccountInfo `json:"acctList"`
SubOrgList []string `json:"subOrgList"`
}
2018-09-27 04:24:38 -07:00
type OrgStruct struct {
OrgId string
Keys []string
2018-09-27 04:24:38 -07:00
}
2018-11-14 02:24:28 -08:00
// permission config for bootstrapping
type PermissionConfig struct {
UpgrdAddress common.Address
InterfAddress common.Address
ImplAddress common.Address
NodeAddress common.Address
AccountAddress common.Address
RoleAddress common.Address
VoterAddress common.Address
OrgAddress common.Address
NwAdminOrg string
NwAdminRole string
OrgAdminRole string
Accounts []common.Address //initial list of account that need full access
SubOrgDepth big.Int
SubOrgBreadth big.Int
}
type OrgKey struct {
OrgId string
}
type NodeKey struct {
OrgId string
Url string
}
type RoleKey struct {
OrgId string
RoleId string
}
type AccountKey struct {
AcctId common.Address
}
type OrgCache struct {
c *lru.Cache
mux sync.Mutex
}
type NodeCache struct {
c *lru.Cache
mux sync.Mutex
}
type RoleCache struct {
c *lru.Cache
mux sync.Mutex
}
type AcctCache struct {
c *lru.Cache
mux sync.Mutex
}
func NewOrgCache() *OrgCache {
c, _ := lru.New(defaultMapLimit)
return &OrgCache{c, sync.Mutex{}}
}
func NewNodeCache() *NodeCache {
c, _ := lru.New(defaultMapLimit)
return &NodeCache{c, sync.Mutex{}}
}
func NewRoleCache() *RoleCache {
c, _ := lru.New(defaultMapLimit)
return &RoleCache{c, sync.Mutex{}}
}
func NewAcctCache() *AcctCache {
c, _ := lru.New(defaultMapLimit)
return &AcctCache{c, sync.Mutex{}}
}
2018-11-13 00:15:28 -08:00
var DefaultAccess = FullAccess
2018-11-12 00:16:56 -08:00
const orgKeyMapLimit = 100
2018-09-27 04:24:38 -07:00
const defaultMapLimit = 100
2018-11-12 00:16:56 -08:00
var OrgKeyMap, _ = lru.New(orgKeyMapLimit)
var OrgInfoMap = NewOrgCache()
var NodeInfoMap = NewNodeCache()
var RoleInfoMap = NewRoleCache()
var AcctInfoMap = NewAcctCache()
2018-11-12 00:16:56 -08:00
var orgKeyLock sync.Mutex
2019-03-13 23:26:17 -07:00
func (pc *PermissionConfig) IsEmpty() bool {
return pc.InterfAddress == common.HexToAddress("0x0") || pc.NodeAddress == common.HexToAddress("0x0") || pc.AccountAddress == common.HexToAddress("0x0")
2019-03-13 23:26:17 -07:00
}
// sets default access to ReadOnly
2018-11-13 00:15:28 -08:00
func SetDefaultAccess() {
DefaultAccess = ReadOnly
2018-11-13 00:15:28 -08:00
}
func (o *OrgCache) UpsertOrg(orgId, parentOrg, ultimateParent string, level *big.Int, status OrgStatus) {
defer o.mux.Unlock()
o.mux.Lock()
var key OrgKey
if parentOrg == "" {
key = OrgKey{OrgId: orgId}
} else {
key = OrgKey{OrgId: parentOrg + "." + orgId}
pkey := OrgKey{OrgId: parentOrg}
if ent, ok := o.c.Get(pkey); ok {
porg := ent.(*OrgInfo)
if !containsKey(porg.SubOrgList, key.OrgId) {
porg.SubOrgList = append(porg.SubOrgList, key.OrgId)
o.c.Add(pkey, porg)
}
}
}
norg := &OrgInfo{orgId, key.OrgId, parentOrg, ultimateParent, level, nil, status}
o.c.Add(key, norg)
}
func containsKey(s []string, e string) bool {
for _, a := range s {
if a == e {
return true
}
}
return false
}
func (o *OrgCache) GetOrg(orgId string) *OrgInfo {
defer o.mux.Unlock()
o.mux.Lock()
key := OrgKey{OrgId: orgId}
if ent, ok := o.c.Get(key); ok {
return ent.(*OrgInfo)
}
return nil
}
func (o *OrgCache) GetOrgList() []OrgInfo {
var olist []OrgInfo
for _, k := range o.c.Keys() {
v, _ := o.c.Get(k)
vp := v.(*OrgInfo)
olist = append(olist, *vp)
}
return olist
}
2019-03-28 21:28:11 -07:00
func (n *NodeCache) UpsertNode(orgId string, url string, status NodeStatus) {
defer n.mux.Unlock()
n.mux.Lock()
key := NodeKey{OrgId: orgId, Url: url}
n.c.Add(key, &NodeInfo{orgId, url, status})
}
func (n *NodeCache) GetNodeByUrl(url string) *NodeInfo {
defer n.mux.Unlock()
n.mux.Lock()
for _, k := range n.c.Keys() {
ent := k.(NodeKey)
if ent.Url == url {
v, _ := n.c.Get(ent)
return v.(*NodeInfo)
}
}
return nil
}
func (o *NodeCache) GetNodeList() []NodeInfo {
var olist []NodeInfo
for _, k := range o.c.Keys() {
v, _ := o.c.Get(k)
vp := v.(*NodeInfo)
olist = append(olist, *vp)
}
return olist
}
2019-03-28 21:28:11 -07:00
func (a *AcctCache) UpsertAccount(orgId string, role string, acct common.Address, orgAdmin bool, status AcctStatus) {
defer a.mux.Unlock()
a.mux.Lock()
key := AccountKey{acct}
a.c.Add(key, &AccountInfo{orgId, role, acct, orgAdmin, status})
}
func (a *AcctCache) GetAccount(acct common.Address) *AccountInfo {
defer a.mux.Unlock()
a.mux.Lock()
if v, ok := a.c.Get(AccountKey{acct}); ok {
return v.(*AccountInfo)
}
return nil
}
func (a *AcctCache) GetAcctList() []AccountInfo {
var alist []AccountInfo
for _, k := range a.c.Keys() {
v, _ := a.c.Get(k)
vp := v.(*AccountInfo)
alist = append(alist, *vp)
}
return alist
}
func (a *AcctCache) GetAcctListOrg(orgId string) []AccountInfo {
var alist []AccountInfo
for _, k := range a.c.Keys() {
v, _ := a.c.Get(k)
vp := v.(*AccountInfo)
if vp.OrgId == orgId {
alist = append(alist, *vp)
}
}
return alist
}
func (a *AcctCache) GetAcctListRole(orgId, roleId string) []AccountInfo {
var alist []AccountInfo
for _, k := range a.c.Keys() {
v, _ := a.c.Get(k)
vp := v.(*AccountInfo)
if vp.OrgId == orgId && vp.RoleId == roleId {
alist = append(alist, *vp)
}
}
return alist
}
2019-03-28 21:28:11 -07:00
func (r *RoleCache) UpsertRole(orgId string, role string, voter bool, access AccessType, active bool) {
defer r.mux.Unlock()
r.mux.Lock()
key := RoleKey{orgId, role}
r.c.Add(key, &RoleInfo{orgId, role, voter, access, active})
}
func (r *RoleCache) GetRole(orgId string, roleId string) *RoleInfo {
defer r.mux.Unlock()
r.mux.Lock()
key := RoleKey{OrgId: orgId, RoleId: roleId}
if ent, ok := r.c.Get(key); ok {
return ent.(*RoleInfo)
}
return nil
}
func (o *RoleCache) GetRoleList() []RoleInfo {
var olist []RoleInfo
for _, k := range o.c.Keys() {
v, _ := o.c.Get(k)
vp := v.(*RoleInfo)
olist = append(olist, *vp)
}
return olist
}
// Returns the access type for an account. If not found returns
// default access
func GetAcctAccess(acctId common.Address) AccessType {
if a := AcctInfoMap.GetAccount(acctId); a != nil && a.Status == AcctActive {
o := OrgInfoMap.GetOrg(a.OrgId)
r := RoleInfoMap.GetRole(a.OrgId, a.RoleId)
if o != nil && r != nil {
if o.Status == OrgApproved && r.Active {
return r.Access
}
}
}
return DefaultAccess
}
2018-09-27 04:24:38 -07:00
func ValidateNodeForTxn(enodeId string, from common.Address) bool {
if enodeId == "" {
return true
}
ac := AcctInfoMap.GetAccount(from)
if ac == nil {
return true
}
ultimateParent := OrgInfoMap.GetOrg(ac.OrgId).UltimateParent
// scan through the node list and validate
for _, n := range NodeInfoMap.GetNodeList() {
if OrgInfoMap.GetOrg(n.OrgId).UltimateParent == ultimateParent && strings.Contains(n.Url, enodeId) {
return true
}
}
return false
}
// Adds org key details to cache
func AddOrgKey(orgId string, key string) {
if OrgKeyMap.Len() != 0 {
if val, ok := OrgKeyMap.Get(orgId); ok {
2018-11-12 00:16:56 -08:00
orgKeyLock.Lock()
defer orgKeyLock.Unlock()
2018-10-02 01:28:55 -07:00
// Org record exists. Append the key only
vo := val.(*OrgStruct)
vo.Keys = append(vo.Keys, key)
2018-10-02 01:28:55 -07:00
return
}
}
OrgKeyMap.Add(orgId, &OrgStruct{OrgId: orgId, Keys: []string{key}})
2018-10-02 01:28:55 -07:00
}
// deletes org key details from cache
func DeleteOrgKey(orgId string, key string) {
if val, ok := OrgKeyMap.Get(orgId); ok {
2018-11-12 00:16:56 -08:00
orgKeyLock.Lock()
defer orgKeyLock.Unlock()
vo := val.(*OrgStruct)
for i, keyVal := range vo.Keys {
if keyVal == key {
vo.Keys = append(vo.Keys[:i], vo.Keys[i+1:]...)
break
2018-10-02 01:28:55 -07:00
}
}
}
2018-09-27 04:24:38 -07:00
}
// Givens a orgid returns the linked keys for the org
func ResolvePrivateForKeys(orgId string) []string {
2018-09-27 04:24:38 -07:00
var keys []string
if val, ok := OrgKeyMap.Get(orgId); ok {
vo := val.(*OrgStruct)
if len(vo.Keys) > 0 {
keys = vo.Keys
} else {
keys = append(keys, orgId)
2018-09-27 04:24:38 -07:00
}
return keys
2018-09-27 04:24:38 -07:00
}
keys = append(keys, orgId)
return keys
}