2018-07-12 03:00:19 -07:00
|
|
|
package permissions
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"math/big"
|
|
|
|
"path/filepath"
|
|
|
|
"strings"
|
|
|
|
|
|
|
|
"github.com/ethereum/go-ethereum/accounts/abi/bind"
|
|
|
|
"github.com/ethereum/go-ethereum/cmd/utils"
|
2018-07-13 18:22:43 -07:00
|
|
|
"github.com/ethereum/go-ethereum/params"
|
2018-07-12 03:00:19 -07:00
|
|
|
"github.com/ethereum/go-ethereum/eth"
|
|
|
|
"github.com/ethereum/go-ethereum/ethclient"
|
|
|
|
"github.com/ethereum/go-ethereum/log"
|
|
|
|
"github.com/ethereum/go-ethereum/node"
|
|
|
|
"github.com/ethereum/go-ethereum/p2p"
|
|
|
|
"gopkg.in/urfave/cli.v1"
|
|
|
|
)
|
2018-07-13 18:22:43 -07:00
|
|
|
|
|
|
|
//This function first adds the node list from permissioned-nodes.json to
|
|
|
|
//the permissiones contract deployed as a precompile via genesis.json
|
|
|
|
func QuorumPermissioning(ctx *cli.Context, stack *node.Node ){
|
|
|
|
|
|
|
|
//Create a new ethclient to for interfacing with the contract
|
|
|
|
e, stateReader := createEthClient(stack)
|
|
|
|
|
|
|
|
//call populate nodes to populate the nodes into contract
|
|
|
|
populateNodesToContract (ctx, stack, e, stateReader)
|
|
|
|
|
|
|
|
//monitor for new nodes addition via smart contract
|
|
|
|
go monitorNewNodeAdd(stateReader)
|
|
|
|
}
|
|
|
|
|
2018-07-12 03:00:19 -07:00
|
|
|
//populates the nodes list from permissioned-nodes.json into the permissions
|
|
|
|
//smart contract
|
2018-07-13 18:22:43 -07:00
|
|
|
func populateNodesToContract(ctx *cli.Context, stack *node.Node, e *eth.Ethereum, stateReader *ethclient.Client){
|
|
|
|
|
|
|
|
//Read the key file from key store. SHOULD WE MAKE IT CONFIG value
|
|
|
|
key := getKeyFromKeyStore(ctx)
|
|
|
|
|
|
|
|
permissionsContract, err := NewPermissions(params.QuorumPermissionsContract, stateReader)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
utils.Fatalf("Failed to instantiate a Permissions contract: %v", err)
|
|
|
|
}
|
|
|
|
auth, err := bind.NewTransactor(strings.NewReader(key), "")
|
|
|
|
if err != nil {
|
|
|
|
utils.Fatalf("Failed to create authorized transactor: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
permissionsSession := &PermissionsSession{
|
|
|
|
Contract: permissionsContract,
|
|
|
|
CallOpts: bind.CallOpts{
|
|
|
|
Pending: true,
|
|
|
|
},
|
|
|
|
TransactOpts: bind.TransactOpts{
|
|
|
|
From: auth.From,
|
|
|
|
Signer: auth.Signer,
|
|
|
|
GasLimit: 3558096384,
|
|
|
|
GasPrice: big.NewInt(0),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
datadir := ctx.GlobalString(utils.DataDirFlag.Name)
|
|
|
|
|
|
|
|
nodes := p2p.ParsePermissionedNodes(datadir)
|
|
|
|
for _, node := range nodes {
|
|
|
|
enodeID := fmt.Sprintf("%x", node.ID[:])
|
|
|
|
log.Trace("Adding node to permissions contract", "enodeID", enodeID)
|
|
|
|
|
|
|
|
nonce := e.TxPool().Nonce(permissionsSession.TransactOpts.From)
|
|
|
|
permissionsSession.TransactOpts.Nonce = new(big.Int).SetUint64(nonce)
|
|
|
|
|
|
|
|
tx, err := permissionsSession.ProposeNode(enodeID, true, true)
|
|
|
|
if err != nil {
|
|
|
|
log.Warn("Failed to propose node", "err", err)
|
|
|
|
}
|
|
|
|
log.Debug("Transaction pending", "tx hash", tx.Hash())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
//This functions listens on the channel for new node approval via smart contract and
|
|
|
|
// adds the same into permissioned-nodes.json
|
|
|
|
func monitorNewNodeAdd(stateReader *ethclient.Client){
|
|
|
|
|
|
|
|
permissions, err := NewPermissionsFilterer(params.QuorumPermissionsContract, stateReader)
|
|
|
|
if err != nil {
|
|
|
|
utils.Fatalf("Failed to instantiate a Permissions Filterer: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
ch := make(chan *PermissionsNewNodeProposed)
|
|
|
|
|
|
|
|
opts := &bind.WatchOpts{}
|
|
|
|
var blockNumber uint64 = 1
|
|
|
|
opts.Start = &blockNumber
|
|
|
|
|
|
|
|
log.Info("Inside the new func added")
|
|
|
|
|
|
|
|
for {
|
|
|
|
log.Info("Inside the new loop - addNewNode")
|
|
|
|
|
|
|
|
_, err = permissions.WatchNewNodeProposed(opts, ch)
|
|
|
|
if err != nil {
|
|
|
|
log.Info("Failed NewNodeProposed: %v", err)
|
|
|
|
}
|
|
|
|
// newEvent = <-ch
|
|
|
|
var newEvent *PermissionsNewNodeProposed = <-ch
|
|
|
|
log.Info("Found Node add event", "enodeId", newEvent.EnodeId)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
//Create an RPC client for the contract interface
|
|
|
|
func createEthClient(stack *node.Node ) (*eth.Ethereum, *ethclient.Client){
|
|
|
|
var e *eth.Ethereum
|
|
|
|
if err := stack.Service(&e); err != nil {
|
|
|
|
utils.Fatalf("Ethereum service not running: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
rpcClient, err := stack.Attach()
|
|
|
|
if err != nil {
|
|
|
|
utils.Fatalf("Failed to attach to self: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return e, ethclient.NewClient(rpcClient)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
//This functions reads the first file in key store directory, reads the key
|
|
|
|
//value and returns the same
|
|
|
|
func getKeyFromKeyStore(ctx *cli.Context) string {
|
|
|
|
datadir := ctx.GlobalString(utils.DataDirFlag.Name)
|
|
|
|
|
|
|
|
files, err := ioutil.ReadDir(filepath.Join(datadir, "keystore"))
|
|
|
|
if err != nil {
|
|
|
|
utils.Fatalf("Failed to read keystore directory: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// (zekun) HACK: here we always use the first key as transactor
|
|
|
|
var keyPath string
|
|
|
|
for _, f := range files {
|
|
|
|
keyPath = filepath.Join(datadir, "keystore", f.Name())
|
|
|
|
break
|
|
|
|
}
|
|
|
|
keyBlob, err := ioutil.ReadFile(keyPath)
|
|
|
|
if err != nil {
|
|
|
|
utils.Fatalf("Failed to read key file: %v", err)
|
|
|
|
}
|
|
|
|
// n := bytes.IndexByte(keyBlob, 0)
|
|
|
|
n := len(keyBlob)
|
|
|
|
|
|
|
|
return string(keyBlob[:n])
|
|
|
|
|
2018-07-12 03:00:19 -07:00
|
|
|
}
|