snt-gas-relay/contracts/identity/Identity.sol

371 lines
10 KiB
Solidity
Raw Normal View History

pragma solidity ^0.4.17;
import "./ERC725.sol";
import "./ERC735.sol";
contract Identity is ERC725, ERC735 {
mapping (bytes32 => Key) keys;
mapping (bytes32 => Claim) claims;
mapping (uint256 => bytes32[]) keysByPurpose;
mapping (uint256 => bytes32[]) claimsByType;
mapping (bytes32 => uint256) indexes;
mapping (uint => Transaction) txx;
mapping (uint256 => uint8) minimumApprovalsByKeyType;
bytes32[] pendingTransactions;
uint nonce = 0;
struct Transaction {
address to;
uint value;
bytes data;
uint nonce;
uint approverCount;
mapping(uint256 => uint8) approvalsByKeyType;
mapping(bytes32 => bool) approvals;
}
2018-01-09 01:00:07 +00:00
modifier managerOnly {
2018-02-21 22:45:25 +00:00
require(isKeyType(bytes32(msg.sender), MANAGEMENT_KEY));
_;
}
2018-01-09 01:00:07 +00:00
2018-02-22 08:16:06 +00:00
modifier selfOnly {
require(msg.sender == address(this));
_;
}
2018-01-09 01:00:07 +00:00
modifier actorOnly {
2018-02-21 22:45:25 +00:00
require(isKeyType(bytes32(msg.sender), ACTION_KEY));
_;
}
2018-01-09 01:00:07 +00:00
modifier claimSignerOnly {
2018-02-21 22:45:25 +00:00
require(isKeyType(bytes32(msg.sender), CLAIM_SIGNER_KEY));
_;
}
modifier managerOrActor {
2018-02-22 08:05:10 +00:00
require(
isKeyType(bytes32(msg.sender), MANAGEMENT_KEY) ||
isKeyType(bytes32(msg.sender), ACTION_KEY)
);
_;
}
2018-01-09 01:00:07 +00:00
function Identity() public {
_addKey(bytes32(msg.sender), MANAGEMENT_KEY, 1);
minimumApprovalsByKeyType[MANAGEMENT_KEY] = 1;
}
2018-01-09 01:00:07 +00:00
2018-02-22 08:05:10 +00:00
function addKey(
bytes32 _key,
uint256 _purpose,
uint256 _type
)
public
2018-02-22 08:16:06 +00:00
selfOnly
2018-02-22 08:05:10 +00:00
returns (bool success)
{
_addKey(_key, _purpose, _type);
return true;
}
2018-01-09 01:00:07 +00:00
2018-02-22 08:05:10 +00:00
function removeKey(
bytes32 _key,
uint256 _purpose
)
public
2018-02-22 08:16:06 +00:00
selfOnly
2018-02-22 08:05:10 +00:00
returns (bool success)
{
_removeKey(_key, _purpose);
return true;
}
2018-01-09 01:00:07 +00:00
2018-02-22 08:05:10 +00:00
function execute(
address _to,
uint256 _value,
bytes _data
)
public
managerOrActor
returns (uint256 executionId)
{
executionId = nonce;
ExecutionRequested(executionId, _to, _value, _data);
txx[executionId] = Transaction(
{
to: _to,
value: _value,
data: _data,
nonce: nonce,
approverCount: 0
});
nonce++;
2018-02-22 08:19:38 +00:00
approve(executionId, true);
}
2018-01-09 01:00:07 +00:00
function approve(uint256 _id, bool _approve)
public
managerOrActor
returns (bool success)
{
Transaction storage trx = txx[_id];
bytes32 managerKeyHash = keccak256(bytes32(msg.sender), MANAGEMENT_KEY);
2018-02-22 08:05:10 +00:00
bytes32 actorKeyHash = keccak256(bytes32(msg.sender), ACTION_KEY);
uint8 approvalCount;
uint256 requiredKeyType;
if (trx.to == address(this)) {
requiredKeyType = MANAGEMENT_KEY;
if (keys[managerKeyHash].purpose == MANAGEMENT_KEY) {
approvalCount = _calculateApprovals(managerKeyHash, MANAGEMENT_KEY, _approve, trx);
}
} else {
requiredKeyType = ACTION_KEY;
if (keys[managerKeyHash].purpose == ACTION_KEY) {
approvalCount = _calculateApprovals(actorKeyHash, ACTION_KEY, _approve, trx);
2018-01-09 01:00:07 +00:00
}
}
2018-02-22 08:05:10 +00:00
if (approvalCount >= minimumApprovalsByKeyType[requiredKeyType]) {
success = trx.to.call.value(txx[_id].value)(txx[_id].data);
2018-02-22 08:05:10 +00:00
}
}
2018-01-09 01:00:07 +00:00
2018-02-22 08:16:06 +00:00
function setMiminumApprovalsByKeyType(
uint256 _type,
uint8 _minimumApprovals
)
public
selfOnly
{
minimumApprovalsByKeyType[_type] = _minimumApprovals;
}
2018-01-09 01:00:07 +00:00
2018-02-22 08:05:10 +00:00
function _calculateApprovals(
bytes32 _keyHash,
uint256 _keyType,
bool _approve,
Transaction storage trx
)
private
returns (uint8 approvalCount)
{
2018-02-22 08:05:10 +00:00
if (trx.approvals[_keyHash] == false && _approve) {
trx.approvalsByKeyType[_keyType]++;
} else if (trx.approvals[_keyHash] == true && !_approve && trx.approverCount > 0) {
trx.approvalsByKeyType[_keyType]--;
2018-01-09 01:00:07 +00:00
}
trx.approvals[_keyHash] = _approve;
trx.approverCount++;
return trx.approvalsByKeyType[_keyType];
}
2018-01-09 01:00:07 +00:00
2018-02-22 08:05:10 +00:00
function addClaim(
uint256 _claimType,
uint256 _scheme,
address _issuer,
bytes _signature,
bytes _data,
string _uri
)
public
claimSignerOnly
returns (bytes32 claimRequestId)
{
bytes32 claimHash = keccak256(_issuer, _claimType);
claimRequestId = claimHash;
if (claims[claimHash].claimType > 0) {
// Claim existed
2018-02-22 08:05:10 +00:00
ClaimChanged(
claimRequestId,
_claimType,
_scheme,
_issuer,
_signature,
_data,
_uri);
} else {
// TODO Triggers if the claim is new Event and approval process exists: ClaimRequested
2018-02-22 08:05:10 +00:00
ClaimRequested(
claimRequestId,
_claimType,
_scheme,
_issuer,
_signature,
_data,
_uri);
2018-01-09 01:00:07 +00:00
}
claims[claimHash] = Claim(
{
claimType: _claimType,
scheme: _scheme,
issuer: _issuer,
signature: _signature,
data: _data,
uri: _uri
}
);
indexes[claimHash] = claimsByType[_claimType].length;
claimsByType[_claimType].push(claimRequestId);
// TODO This SHOULD create a pending claim, which SHOULD to be approved or rejected by n of m approve calls from keys of purpose 1.
}
function removeClaim(bytes32 _claimId) public returns (bool success) {
Claim memory c = claims[_claimId];
2018-02-22 08:05:10 +00:00
require(
msg.sender == c.issuer ||
msg.sender == address(this) ||
isKeyType(bytes32(msg.sender), MANAGEMENT_KEY)
);
// MUST only be done by the issuer of the claim, or KEYS OF PURPOSE 1, or the identity itself.
// TODO If its the identity itself, the approval process will determine its approval.
uint claimIdTypePos = indexes[_claimId];
delete indexes[_claimId];
bytes32[] storage claimsTypeArr = claimsByType[c.claimType];
bytes32 replacer = claimsTypeArr[claimsTypeArr.length-1];
claimsTypeArr[claimIdTypePos] = replacer;
indexes[replacer] = claimIdTypePos;
delete claims[_claimId];
claimsTypeArr.length--;
return true;
}
2018-01-09 01:00:07 +00:00
function _addKey(bytes32 _key, uint256 _purpose, uint256 _type) private {
bytes32 keyHash = keccak256(_key, _purpose);
require(keys[keyHash].purpose == 0);
2018-02-22 08:05:10 +00:00
require(
_purpose == MANAGEMENT_KEY ||
_purpose == ACTION_KEY ||
_purpose == CLAIM_SIGNER_KEY ||
_purpose == ENCRYPTION_KEY
);
KeyAdded(_key, _purpose, _type);
keys[keyHash] = Key(_purpose, _type, _key);
indexes[keyHash] = keysByPurpose[_purpose].push(_key) - 1;
}
2018-01-09 01:00:07 +00:00
function _removeKey(bytes32 _key, uint256 _purpose) private {
bytes32 keyHash = keccak256(_key, _purpose);
Key storage myKey = keys[keyHash];
KeyRemoved(myKey.key, myKey.purpose, myKey.keyType);
uint index = indexes[keyHash];
delete indexes[keyHash];
bytes32 replacer = keysByPurpose[_purpose][keysByPurpose[_purpose].length - 1];
keysByPurpose[_purpose][index] = replacer;
2018-02-22 08:05:10 +00:00
indexes[keccak256(replacer, _purpose)] = index;
keysByPurpose[_purpose].length--;
if (_purpose == MANAGEMENT_KEY) {
require(keysByPurpose[MANAGEMENT_KEY].length >= 1);
2018-01-09 01:00:07 +00:00
}
delete keys[keyHash];
// MUST only be done by keys of purpose 1, or the identity itself.
// TODO If its the identity itself, the approval process will determine its approval.
}
2018-01-09 01:00:07 +00:00
2018-02-22 08:05:10 +00:00
function getKey(
bytes32 _key,
uint256 _purpose
)
public
constant
returns(uint256 purpose, uint256 keyType, bytes32 key)
{
Key storage myKey = keys[keccak256(_key, _purpose)];
return (myKey.purpose, myKey.keyType, myKey.key);
}
2018-02-21 22:45:25 +00:00
2018-02-22 08:05:10 +00:00
function isKeyType(bytes32 _key, uint256 _type)
public
constant
returns (bool)
{
2018-02-21 22:45:25 +00:00
return keys[keccak256(_key, _type)].purpose == _type;
}
2018-01-09 01:00:07 +00:00
2018-02-22 08:05:10 +00:00
function getKeyPurpose(bytes32 _key)
public
constant
returns(uint256[] purpose)
{
uint256[] memory purposeHolder = new uint256[](4);
uint8 counter = 0;
2018-02-21 22:45:25 +00:00
if (isKeyType(_key, MANAGEMENT_KEY)) {
purposeHolder[counter] = MANAGEMENT_KEY;
counter++;
2018-01-09 01:00:07 +00:00
}
2018-02-21 22:45:25 +00:00
if (isKeyType(_key, ACTION_KEY)) {
purposeHolder[counter] = ACTION_KEY;
counter++;
2018-01-09 01:00:07 +00:00
}
2018-02-21 22:45:25 +00:00
if (isKeyType(_key, CLAIM_SIGNER_KEY)) {
purposeHolder[counter] = CLAIM_SIGNER_KEY;
counter++;
2018-01-09 01:00:07 +00:00
}
2018-02-21 22:45:25 +00:00
if (isKeyType(_key, ENCRYPTION_KEY)) {
purposeHolder[counter] = ENCRYPTION_KEY;
counter++;
2018-01-09 01:00:07 +00:00
}
uint256[] memory result = new uint256[](counter);
2018-02-22 08:05:10 +00:00
for (uint8 i = 0; i < counter; i++) {
result[i] = purposeHolder[i];
2018-02-22 08:05:10 +00:00
}
return result;
}
2018-02-22 08:05:10 +00:00
function getKeysByPurpose(uint256 _purpose)
public
constant
returns(bytes32[] keys)
{
return keysByPurpose[_purpose];
}
2018-02-22 08:05:10 +00:00
function getClaim(bytes32 _claimId)
public
constant
returns(uint256 claimType, uint256 scheme, address issuer, bytes signature, bytes data, string uri)
{
Claim memory _claim = claims[_claimId];
return (_claim.claimType, _claim.scheme, _claim.issuer, _claim.signature, _claim.data, _claim.uri);
}
2018-02-22 08:05:10 +00:00
function getClaimIdsByType(uint256 _claimType)
public
constant
returns(bytes32[] claimIds)
{
return claimsByType[_claimType];
2018-01-09 01:00:07 +00:00
}
}
2018-01-09 01:00:07 +00:00