forked from hyperledger/fabric
-
Notifications
You must be signed in to change notification settings - Fork 0
/
sigfilter.go
81 lines (68 loc) · 2.81 KB
/
sigfilter.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
/*
Copyright IBM Corp. All Rights Reserved.
SPDX-License-Identifier: Apache-2.0
*/
package msgprocessor
import (
"fmt"
cb "github.com/hyperledger/fabric-protos-go/common"
"github.com/hyperledger/fabric-protos-go/orderer"
"github.com/hyperledger/fabric/common/channelconfig"
"github.com/hyperledger/fabric/common/policies"
"github.com/hyperledger/fabric/protoutil"
"github.com/pkg/errors"
)
// SigFilterSupport provides the resources required for the signature filter
type SigFilterSupport interface {
// PolicyManager returns a reference to the current policy manager
PolicyManager() policies.Manager
// OrdererConfig returns the config.Orderer for the channel and whether the Orderer config exists
OrdererConfig() (channelconfig.Orderer, bool)
}
// SigFilter stores the name of the policy to apply to deliver requests to
// determine whether a client is authorized
type SigFilter struct {
normalPolicyName string
maintenancePolicyName string
support SigFilterSupport
}
// NewSigFilter creates a new signature filter, at every evaluation, the policy manager is called
// to retrieve the latest version of the policy.
//
// normalPolicyName is applied when Orderer/ConsensusType.State = NORMAL
// maintenancePolicyName is applied when Orderer/ConsensusType.State = MAINTENANCE
func NewSigFilter(normalPolicyName, maintenancePolicyName string, support SigFilterSupport) *SigFilter {
return &SigFilter{
normalPolicyName: normalPolicyName,
maintenancePolicyName: maintenancePolicyName,
support: support,
}
}
// Apply applies the policy given, resulting in Reject or Forward, never Accept
func (sf *SigFilter) Apply(message *cb.Envelope) error {
ordererConf, ok := sf.support.OrdererConfig()
if !ok {
logger.Panic("Programming error: orderer config not found")
}
signedData, err := protoutil.EnvelopeAsSignedData(message)
if err != nil {
return fmt.Errorf("could not convert message to signedData: %s", err)
}
// In maintenance mode, we typically require the signature of /Channel/Orderer/Writers.
// This will filter out configuration changes that are not related to consensus-type migration
// (e.g on /Channel/Application), and will block Deliver requests from peers (which are normally /Channel/Readers).
var policyName = sf.normalPolicyName
if ordererConf.ConsensusState() == orderer.ConsensusType_STATE_MAINTENANCE {
policyName = sf.maintenancePolicyName
}
policy, ok := sf.support.PolicyManager().GetPolicy(policyName)
if !ok {
return fmt.Errorf("could not find policy %s", policyName)
}
err = policy.EvaluateSignedData(signedData)
if err != nil {
logger.Debugf("SigFilter evaluation failed: %s, policyName: %s, ConsensusState: %s", err.Error(), policyName, ordererConf.ConsensusState())
return errors.Wrap(errors.WithStack(ErrPermissionDenied), err.Error())
}
return nil
}