You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
159 lines
4.9 KiB
159 lines
4.9 KiB
pragma solidity ^0.4.24;
|
|
|
|
import "../ownership/Ownable.sol";
|
|
import "../access/rbac/RBAC.sol";
|
|
import "../ECRecovery.sol";
|
|
|
|
|
|
/**
|
|
* @title SignatureBouncer
|
|
* @author PhABC, Shrugs and aflesher
|
|
* @dev Bouncer allows users to submit a signature as a permission to do an action.
|
|
* If the signature is from one of the authorized bouncer addresses, the signature
|
|
* is valid. The owner of the contract adds/removes bouncers.
|
|
* Bouncer addresses can be individual servers signing grants or different
|
|
* users within a decentralized club that have permission to invite other members.
|
|
* This technique is useful for whitelists and airdrops; instead of putting all
|
|
* valid addresses on-chain, simply sign a grant of the form
|
|
* keccak256(abi.encodePacked(`:contractAddress` + `:granteeAddress`)) using a valid bouncer address.
|
|
* Then restrict access to your crowdsale/whitelist/airdrop using the
|
|
* `onlyValidSignature` modifier (or implement your own using isValidSignature).
|
|
* In addition to `onlyValidSignature`, `onlyValidSignatureAndMethod` and
|
|
* `onlyValidSignatureAndData` can be used to restrict access to only a given method
|
|
* or a given method with given parameters respectively.
|
|
* See the tests Bouncer.test.js for specific usage examples.
|
|
* @notice A method that uses the `onlyValidSignatureAndData` modifier must make the _signature
|
|
* parameter the "last" parameter. You cannot sign a message that has its own
|
|
* signature in it so the last 128 bytes of msg.data (which represents the
|
|
* length of the _signature data and the _signaature data itself) is ignored when validating.
|
|
* Also non fixed sized parameters make constructing the data in the signature
|
|
* much more complex. See https://ethereum.stackexchange.com/a/50616 for more details.
|
|
*/
|
|
contract SignatureBouncer is Ownable, RBAC {
|
|
using ECRecovery for bytes32;
|
|
|
|
string public constant ROLE_BOUNCER = "bouncer";
|
|
uint constant METHOD_ID_SIZE = 4;
|
|
// signature size is 65 bytes (tightly packed v + r + s), but gets padded to 96 bytes
|
|
uint constant SIGNATURE_SIZE = 96;
|
|
|
|
/**
|
|
* @dev requires that a valid signature of a bouncer was provided
|
|
*/
|
|
modifier onlyValidSignature(bytes _signature)
|
|
{
|
|
require(isValidSignature(msg.sender, _signature));
|
|
_;
|
|
}
|
|
|
|
/**
|
|
* @dev requires that a valid signature with a specifed method of a bouncer was provided
|
|
*/
|
|
modifier onlyValidSignatureAndMethod(bytes _signature)
|
|
{
|
|
require(isValidSignatureAndMethod(msg.sender, _signature));
|
|
_;
|
|
}
|
|
|
|
/**
|
|
* @dev requires that a valid signature with a specifed method and params of a bouncer was provided
|
|
*/
|
|
modifier onlyValidSignatureAndData(bytes _signature)
|
|
{
|
|
require(isValidSignatureAndData(msg.sender, _signature));
|
|
_;
|
|
}
|
|
|
|
/**
|
|
* @dev allows the owner to add additional bouncer addresses
|
|
*/
|
|
function addBouncer(address _bouncer)
|
|
public
|
|
onlyOwner
|
|
{
|
|
require(_bouncer != address(0));
|
|
addRole(_bouncer, ROLE_BOUNCER);
|
|
}
|
|
|
|
/**
|
|
* @dev allows the owner to remove bouncer addresses
|
|
*/
|
|
function removeBouncer(address _bouncer)
|
|
public
|
|
onlyOwner
|
|
{
|
|
require(_bouncer != address(0));
|
|
removeRole(_bouncer, ROLE_BOUNCER);
|
|
}
|
|
|
|
/**
|
|
* @dev is the signature of `this + sender` from a bouncer?
|
|
* @return bool
|
|
*/
|
|
function isValidSignature(address _address, bytes _signature)
|
|
internal
|
|
view
|
|
returns (bool)
|
|
{
|
|
return isValidDataHash(
|
|
keccak256(abi.encodePacked(address(this), _address)),
|
|
_signature
|
|
);
|
|
}
|
|
|
|
/**
|
|
* @dev is the signature of `this + sender + methodId` from a bouncer?
|
|
* @return bool
|
|
*/
|
|
function isValidSignatureAndMethod(address _address, bytes _signature)
|
|
internal
|
|
view
|
|
returns (bool)
|
|
{
|
|
bytes memory data = new bytes(METHOD_ID_SIZE);
|
|
for (uint i = 0; i < data.length; i++) {
|
|
data[i] = msg.data[i];
|
|
}
|
|
return isValidDataHash(
|
|
keccak256(abi.encodePacked(address(this), _address, data)),
|
|
_signature
|
|
);
|
|
}
|
|
|
|
/**
|
|
* @dev is the signature of `this + sender + methodId + params(s)` from a bouncer?
|
|
* @notice the _signature parameter of the method being validated must be the "last" parameter
|
|
* @return bool
|
|
*/
|
|
function isValidSignatureAndData(address _address, bytes _signature)
|
|
internal
|
|
view
|
|
returns (bool)
|
|
{
|
|
require(msg.data.length > SIGNATURE_SIZE);
|
|
bytes memory data = new bytes(msg.data.length - SIGNATURE_SIZE);
|
|
for (uint i = 0; i < data.length; i++) {
|
|
data[i] = msg.data[i];
|
|
}
|
|
return isValidDataHash(
|
|
keccak256(abi.encodePacked(address(this), _address, data)),
|
|
_signature
|
|
);
|
|
}
|
|
|
|
/**
|
|
* @dev internal function to convert a hash to an eth signed message
|
|
* and then recover the signature and check it against the bouncer role
|
|
* @return bool
|
|
*/
|
|
function isValidDataHash(bytes32 _hash, bytes _signature)
|
|
internal
|
|
view
|
|
returns (bool)
|
|
{
|
|
address signer = _hash
|
|
.toEthSignedMessageHash()
|
|
.recover(_signature);
|
|
return hasRole(signer, ROLE_BOUNCER);
|
|
}
|
|
}
|
|
|