123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120 |
- pragma solidity ^0.5.7;
- import "../access/roles/SignerRole.sol";
- import "../cryptography/ECDSA.sol";
- /**
- * @title SignatureBouncer
- * @author PhABC, Shrugs and aflesher
- * @dev SignatureBouncer allows users to submit a signature as a permission to
- * do an action.
- * If the signature is from one of the authorized signer addresses, the
- * signature is valid.
- * Note that SignatureBouncer offers no protection against replay attacks, users
- * must add this themselves!
- *
- * Signer addresses can be individual servers signing grants or different
- * users within a decentralized club that have permission to invite other
- * members. This technique is useful for whitelists and airdrops; instead of
- * putting all valid addresses on-chain, simply sign a grant of the form
- * keccak256(abi.encodePacked(`:contractAddress` + `:granteeAddress`)) using a
- * valid signer address.
- * Then restrict access to your crowdsale/whitelist/airdrop using the
- * `onlyValidSignature` modifier (or implement your own using _isValidSignature).
- * In addition to `onlyValidSignature`, `onlyValidSignatureAndMethod` and
- * `onlyValidSignatureAndData` can be used to restrict access to only a given
- * method or a given method with given parameters respectively.
- * See the tests in SignatureBouncer.test.js for specific usage examples.
- *
- * @notice A method that uses the `onlyValidSignatureAndData` modifier must make
- * the _signature parameter the "last" parameter. You cannot sign a message that
- * has its own signature in it so the last 128 bytes of msg.data (which
- * represents the length of the _signature data and the _signature data itself)
- * is ignored when validating. Also non fixed sized parameters make constructing
- * the data in the signature much more complex.
- * See https://ethereum.stackexchange.com/a/50616 for more details.
- */
- contract SignatureBouncer is SignerRole {
- using ECDSA for bytes32;
- // Function selectors are 4 bytes long, as documented in
- // https://solidity.readthedocs.io/en/v0.4.24/abi-spec.html#function-selector
- uint256 private constant _METHOD_ID_SIZE = 4;
- // Signature size is 65 bytes (tightly packed v + r + s), but gets padded to 96 bytes
- uint256 private constant _SIGNATURE_SIZE = 96;
- constructor () internal {
- // solhint-disable-previous-line no-empty-blocks
- }
- /**
- * @dev Requires that a valid signature of a signer was provided.
- */
- modifier onlyValidSignature(bytes memory signature) {
- require(_isValidSignature(msg.sender, signature));
- _;
- }
- /**
- * @dev Requires that a valid signature with a specified method of a signer was provided.
- */
- modifier onlyValidSignatureAndMethod(bytes memory signature) {
- require(_isValidSignatureAndMethod(msg.sender, signature));
- _;
- }
- /**
- * @dev Requires that a valid signature with a specified method and params of a signer was provided.
- */
- modifier onlyValidSignatureAndData(bytes memory signature) {
- require(_isValidSignatureAndData(msg.sender, signature));
- _;
- }
- /**
- * @dev is the signature of `this + account` from a signer?
- * @return bool
- */
- function _isValidSignature(address account, bytes memory signature) internal view returns (bool) {
- return _isValidDataHash(keccak256(abi.encodePacked(address(this), account)), signature);
- }
- /**
- * @dev is the signature of `this + account + methodId` from a signer?
- * @return bool
- */
- function _isValidSignatureAndMethod(address account, bytes memory signature) internal view returns (bool) {
- bytes memory data = new bytes(_METHOD_ID_SIZE);
- for (uint i = 0; i < data.length; i++) {
- data[i] = msg.data[i];
- }
- return _isValidDataHash(keccak256(abi.encodePacked(address(this), account, data)), signature);
- }
- /**
- * @dev is the signature of `this + account + methodId + params(s)` from a signer?
- * @notice the signature parameter of the method being validated must be the "last" parameter
- * @return bool
- */
- function _isValidSignatureAndData(address account, bytes memory signature) internal view returns (bool) {
- require(msg.data.length > _SIGNATURE_SIZE);
- bytes memory data = new bytes(msg.data.length - _SIGNATURE_SIZE);
- for (uint i = 0; i < data.length; i++) {
- data[i] = msg.data[i];
- }
- return _isValidDataHash(keccak256(abi.encodePacked(address(this), account, data)), signature);
- }
- /**
- * @dev Internal function to convert a hash to an eth signed message
- * and then recover the signature and check it against the signer role.
- * @return bool
- */
- function _isValidDataHash(bytes32 hash, bytes memory signature) internal view returns (bool) {
- address signer = hash.toEthSignedMessageHash().recover(signature);
- return signer != address(0) && isSigner(signer);
- }
- }
|