diff --git a/nns/frostfsid.go b/nns/frostfsid.go new file mode 100644 index 0000000..fcc2d87 --- /dev/null +++ b/nns/frostfsid.go @@ -0,0 +1,39 @@ +package nns + +import ( + "github.com/nspcc-dev/neo-go/pkg/interop" + "github.com/nspcc-dev/neo-go/pkg/interop/contract" + "github.com/nspcc-dev/neo-go/pkg/interop/native/management" + "github.com/nspcc-dev/neo-go/pkg/interop/native/std" + "github.com/nspcc-dev/neo-go/pkg/interop/storage" +) + +const FrostfsIDNNSName = "frostfsid.frostfs" + +const ( + FrostfsIDNNSTLDPermissionKey = "nns-allow-register-tld" + FrostfsIDTLDRegistrationAllowed = "allow" +) + +func checkFrostfsID(ctx storage.Context, addr interop.Hash160) bool { + if len(addr) == 0 { + return false + } + + frostfsIDAddress := getRecordsByType(ctx, []byte(tokenIDFromName(FrostfsIDNNSName)), FrostfsIDNNSName, TXT) + if len(frostfsIDAddress) < 2 { + return false + } + + decodedBytes := std.Base58Decode([]byte(frostfsIDAddress[1])) + + if len(decodedBytes) < 21 || management.GetContract(decodedBytes[1:21]) == nil { + return false + } + + if res := contract.Call(decodedBytes[1:21], "getSubjectKV", contract.ReadOnly, addr, FrostfsIDNNSTLDPermissionKey).(string); res == FrostfsIDTLDRegistrationAllowed { + return true + } + + return false +} diff --git a/nns/nns_contract.go b/nns/nns_contract.go index 7337b83..9df2d18 100644 --- a/nns/nns_contract.go +++ b/nns/nns_contract.go @@ -344,7 +344,7 @@ func register(ctx storage.Context, name string, owner interop.Hash160, email str tldBytes := storage.Get(ctx, tldKey) if countZone == 1 { - checkCommittee() + checkCommitteeAndFrostfsID(ctx, owner) if tldBytes != nil { panic("TLD already exists") } @@ -924,6 +924,14 @@ func isValid(address interop.Hash160) bool { return address != nil && len(address) == interop.Hash160Len } +// checkCommitteeAndFrostfsID panics if the script container is not signed by the committee. +// or if the owner does not have permission in FrostfsID. +func checkCommitteeAndFrostfsID(ctx storage.Context, owner interop.Hash160) { + if !checkFrostfsID(ctx, owner) { + checkCommittee() + } +} + // checkCommittee panics if the script container is not signed by the committee. func checkCommittee() { committee := neo.GetCommittee() diff --git a/tests/nns_test.go b/tests/nns_test.go index 49ea4f7..f19a448 100644 --- a/tests/nns_test.go +++ b/tests/nns_test.go @@ -12,10 +12,12 @@ import ( "github.com/nspcc-dev/neo-go/pkg/core/interop/storage" "github.com/nspcc-dev/neo-go/pkg/core/state" "github.com/nspcc-dev/neo-go/pkg/core/transaction" + "github.com/nspcc-dev/neo-go/pkg/encoding/address" "github.com/nspcc-dev/neo-go/pkg/neotest" "github.com/nspcc-dev/neo-go/pkg/rpcclient/gas" "github.com/nspcc-dev/neo-go/pkg/util" "github.com/nspcc-dev/neo-go/pkg/vm/stackitem" + "github.com/nspcc-dev/neo-go/pkg/wallet" "github.com/stretchr/testify/require" ) @@ -23,8 +25,7 @@ const nnsPath = "../nns" const msPerYear = 365 * 24 * time.Hour / time.Millisecond -func newNNSInvoker(t *testing.T, addRoot bool) *neotest.ContractInvoker { - e := newExecutor(t) +func deployNNS(t *testing.T, e *neotest.Executor, addRoot bool) *neotest.ContractInvoker { ctr := neotest.CompileFile(t, e.CommitteeHash, nnsPath, path.Join(nnsPath, "config.yml")) e.DeployContract(t, ctr, nil) @@ -39,6 +40,28 @@ func newNNSInvoker(t *testing.T, addRoot bool) *neotest.ContractInvoker { return c } +func newNNSInvoker(t *testing.T, addRoot bool) *neotest.ContractInvoker { + e := newExecutor(t) + return deployNNS(t, e, addRoot) +} + +func newNNSInvokerWithFrostfsID(t *testing.T, addRoot bool) (*neotest.ContractInvoker, *neotest.ContractInvoker) { + e := newExecutor(t) + c := deployNNS(t, e, addRoot) + + frostfdID := deployFrostFSIDContract(t, e, e.CommitteeHash) + c.Invoke(t, true, "register", + nns.FrostfsIDNNSName, c.CommitteeHash, + "myemail@frostfs.info", defaultRefresh, defaultRetry, defaultExpire, defaultTTL) + + c.Invoke(t, stackitem.Null{}, "addRecord", + nns.FrostfsIDNNSName, int64(nns.TXT), frostfdID.StringLE()) + + c.Invoke(t, stackitem.Null{}, "addRecord", + nns.FrostfsIDNNSName, int64(nns.TXT), address.Uint160ToString(frostfdID)) + return e.NewInvoker(c.Hash), e.CommitteeInvoker(frostfdID) +} + func TestNNSGeneric(t *testing.T) { c := newNNSInvoker(t, false) @@ -527,6 +550,40 @@ func TestNNSSetAdmin(t *testing.T) { "testdomain.com", int64(nns.TXT), "will be added") } +func TestNNS_Frostfsid(t *testing.T) { + nnsInv, f := newNNSInvokerWithFrostfsID(t, false) + + acc, err := wallet.NewAccount() + require.NoError(t, err) + nnsUserInv := nnsInv.NewInvoker(nnsInv.Hash, newSigner(t, nnsInv, acc)) + + nnsUserInv.InvokeFail(t, "not witnessed by committee", "register", + "ddd", acc.ScriptHash(), + "myemail@frostfs.info", defaultRefresh, defaultRetry, defaultExpire, defaultTTL) + + nnsUserInv.InvokeFail(t, "not witnessed by committee", "register", + "testdomain.kz", acc.ScriptHash(), + "myemail@frostfs.info", defaultRefresh, defaultRetry, defaultExpire, defaultTTL) + + f.Invoke(t, stackitem.Null{}, createSubjectMethod, "", acc.PrivateKey().PublicKey().Bytes()) + + nnsUserInv.InvokeFail(t, "not witnessed by committee", "register", + "testdomain.kz", acc.ScriptHash(), + "myemail@frostfs.info", defaultRefresh, defaultRetry, defaultExpire, defaultTTL) + + f.Invoke(t, stackitem.Null{}, setSubjectKVMethod, acc.ScriptHash(), nns.FrostfsIDNNSTLDPermissionKey, nns.FrostfsIDTLDRegistrationAllowed) + + nnsUserInv.Invoke(t, true, "register", + "testdomain.kz", acc.ScriptHash(), + "myemail@frostfs.info", defaultRefresh, defaultRetry, defaultExpire, defaultTTL) + + f.Invoke(t, stackitem.Null{}, deleteSubjectKVMethod, acc.ScriptHash(), nns.FrostfsIDNNSTLDPermissionKey) + + nnsUserInv.InvokeFail(t, "not witnessed by committee", "register", + "testdomain.uz", acc.ScriptHash(), + "myemail@frostfs.info", defaultRefresh, defaultRetry, defaultExpire, defaultTTL) +} + func TestNNSIsAvailable(t *testing.T) { c := newNNSInvoker(t, false)