1#![cfg_attr(not(feature = "std"), no_std)]
19
20#[cfg(feature = "runtime-benchmarks")]
21mod benchmarking;
22#[cfg(test)]
23mod tests;
24pub mod weights;
25
26extern crate alloc;
27
28use crate::weights::WeightInfo;
29#[cfg(not(feature = "std"))]
30use alloc::collections::BTreeSet;
31#[cfg(not(feature = "std"))]
32use alloc::vec::Vec;
33use frame_support::dispatch::{DispatchResult, DispatchResultWithPostInfo};
34use frame_support::ensure;
35use frame_support::traits::Time;
36use frame_support::weights::Weight;
37pub use pallet::*;
38use parity_scale_codec::{Decode, Encode};
39use scale_info::TypeInfo;
40use sp_auto_id::auto_id_runtime_interface::{decode_tbs_certificate, verify_signature};
41use sp_auto_id::{DerVec, SignatureVerificationRequest, Validity};
42use sp_core::{blake2_256, H256, U256};
43#[cfg(feature = "std")]
44use std::collections::BTreeSet;
45use subspace_runtime_primitives::Moment;
46
47pub type Identifier = H256;
49
50pub type Serial = U256;
52
53#[derive(Debug, Decode, Encode, TypeInfo, PartialEq, Eq, Clone)]
55pub struct X509Certificate {
56 pub issuer_id: Option<Identifier>,
58 pub serial: U256,
60 pub subject_common_name: Vec<u8>,
62 pub subject_public_key_info: DerVec,
64 pub validity: Validity,
66 pub raw: DerVec,
68 pub issued_serials: BTreeSet<Serial>,
71 pub nonce: U256,
73}
74
75#[derive(Debug, Decode, Encode, TypeInfo, PartialEq, Eq, Clone)]
77pub enum Certificate {
78 X509(X509Certificate),
79}
80
81impl Certificate {
82 #[cfg(test)]
84 fn subject_common_name(&self) -> Vec<u8> {
85 match self {
86 Certificate::X509(cert) => cert.subject_common_name.clone(),
87 }
88 }
89
90 fn subject_public_key_info(&self) -> DerVec {
92 match self {
93 Certificate::X509(cert) => cert.subject_public_key_info.clone(),
94 }
95 }
96
97 fn issue_certificate_serial<T: Config>(&mut self, serial: U256) -> DispatchResult {
98 match self {
99 Certificate::X509(cert) => {
100 ensure!(
101 !cert.issued_serials.contains(&serial),
102 Error::<T>::CertificateSerialAlreadyIssued
103 );
104 cert.issued_serials.insert(serial);
105 Ok(())
106 }
107 }
108 }
109
110 fn issuer_id(&self) -> Option<Identifier> {
111 match self {
112 Certificate::X509(cert) => cert.issuer_id,
113 }
114 }
115
116 fn serial(&self) -> Serial {
117 match self {
118 Certificate::X509(cert) => cert.serial,
119 }
120 }
121
122 fn issued_serials(&self) -> BTreeSet<Serial> {
123 match self {
124 Certificate::X509(cert) => cert.issued_serials.clone(),
125 }
126 }
127
128 pub(crate) fn is_valid_at(&self, time: Moment) -> bool {
130 match self {
131 Certificate::X509(cert) => cert.validity.is_valid_at(time),
132 }
133 }
134
135 fn derive_identifier(&self) -> Identifier {
140 match &self {
141 Certificate::X509(cert) => {
142 if let Some(issuer_id) = cert.issuer_id {
143 let mut data = issuer_id.to_fixed_bytes().to_vec();
144
145 data.extend_from_slice(cert.subject_common_name.as_ref());
146
147 blake2_256(&data).into()
148 } else {
149 blake2_256(cert.subject_common_name.as_ref()).into()
151 }
152 }
153 }
154 }
155
156 fn nonce(&self) -> U256 {
157 match self {
158 Certificate::X509(cert) => cert.nonce,
159 }
160 }
161
162 fn inc_nonce<T: Config>(&mut self) -> DispatchResult {
163 match self {
164 Certificate::X509(cert) => {
165 cert.nonce = cert
166 .nonce
167 .checked_add(U256::one())
168 .ok_or(Error::<T>::NonceOverflow)?;
169 Ok(())
170 }
171 }
172 }
173}
174
175#[derive(Debug, Decode, Encode, TypeInfo, PartialEq, Eq, Clone)]
177pub struct AutoId {
178 pub certificate: Certificate,
180}
181
182#[derive(Debug, Decode, Encode, TypeInfo, PartialEq, Eq, Clone)]
184pub enum RegisterAutoIdX509 {
185 Root {
186 certificate: DerVec,
187 signature_algorithm: DerVec,
188 signature: Vec<u8>,
189 },
190 Leaf {
191 issuer_id: Identifier,
192 certificate: DerVec,
193 signature_algorithm: DerVec,
194 signature: Vec<u8>,
195 },
196}
197
198#[derive(Debug, Decode, Encode, TypeInfo, PartialEq, Eq, Clone)]
200pub enum RenewAutoId {
201 X509(RenewX509Certificate),
202}
203
204#[derive(Debug, Decode, Encode, TypeInfo, PartialEq, Eq, Clone)]
206pub struct RenewX509Certificate {
207 issuer_id: Option<Identifier>,
208 certificate: DerVec,
209 signature_algorithm: DerVec,
210 signature: Vec<u8>,
211}
212
213#[derive(Debug, Decode, Encode, TypeInfo, PartialEq, Eq, Clone)]
215pub struct Signature {
216 pub signature_algorithm: DerVec,
217 pub value: Vec<u8>,
218}
219
220#[derive(Debug, Decode, Encode, TypeInfo, PartialEq, Eq, Clone)]
222pub enum RegisterAutoId {
223 X509(RegisterAutoIdX509),
224}
225
226#[derive(Debug, Decode, Encode, TypeInfo, PartialEq, Eq, Clone)]
228pub enum CertificateActionType {
229 RevokeCertificate,
230 DeactivateAutoId,
231}
232
233#[derive(Debug, Decode, Encode, TypeInfo, PartialEq, Eq, Clone)]
235pub struct CertificateAction {
236 pub id: Identifier,
238 pub nonce: U256,
240 pub action_type: CertificateActionType,
242}
243
244#[expect(clippy::useless_conversion, reason = "Macro-generated")]
245#[frame_support::pallet]
246mod pallet {
247 use super::*;
248 use crate::weights::WeightInfo;
249 use crate::{AutoId, Identifier, RegisterAutoId, Serial, Signature};
250 use frame_support::pallet_prelude::*;
251 use frame_support::traits::Time;
252 use frame_system::pallet_prelude::*;
253
254 #[pallet::config]
255 pub trait Config: frame_system::Config {
256 type RuntimeEvent: From<Event<Self>> + IsType<<Self as frame_system::Config>::RuntimeEvent>;
257 type Time: Time<Moment = subspace_runtime_primitives::Moment>;
258 type Weights: WeightInfo;
259 }
260
261 #[pallet::pallet]
262 #[pallet::without_storage_info]
263 pub struct Pallet<T>(_);
264
265 #[pallet::storage]
267 pub(super) type AutoIds<T> = StorageMap<_, Identity, Identifier, AutoId, OptionQuery>;
268
269 #[pallet::storage]
274 pub(super) type CertificateRevocationList<T> =
275 StorageMap<_, Identity, Identifier, BTreeSet<Serial>, OptionQuery>;
276
277 #[pallet::error]
278 pub enum Error<T> {
279 UnknownIssuer,
281 UnknownAutoId,
283 InvalidCertificate,
285 InvalidSignature,
287 CertificateSerialAlreadyIssued,
289 ExpiredCertificate,
291 CertificateRevoked,
293 CertificateAlreadyRevoked,
295 NonceOverflow,
297 AutoIdIdentifierAlreadyExists,
299 AutoIdIdentifierMismatch,
301 PublicKeyMismatch,
303 }
304
305 #[pallet::event]
306 #[pallet::generate_deposit(pub (super) fn deposit_event)]
307 pub enum Event<T: Config> {
308 NewAutoIdRegistered(Identifier),
310 CertificateRevoked(Identifier),
312 AutoIdDeactivated(Identifier),
314 AutoIdRenewed(Identifier),
316 }
317
318 #[pallet::call]
319 impl<T: Config> Pallet<T> {
320 #[pallet::call_index(0)]
322 #[pallet::weight(Pallet::<T>::max_register_auto_id_weight())]
323 pub fn register_auto_id(
324 origin: OriginFor<T>,
325 req: RegisterAutoId,
326 ) -> DispatchResultWithPostInfo {
327 ensure_signed(origin)?;
328 Self::do_register_auto_id(req)
329 }
330
331 #[pallet::call_index(1)]
335 #[pallet::weight(Pallet::<T>::max_revoke_auto_id_weight())]
336 pub fn revoke_certificate(
337 origin: OriginFor<T>,
338 auto_id_identifier: Identifier,
339 signature: Signature,
340 ) -> DispatchResultWithPostInfo {
341 ensure_signed(origin)?;
342 Self::do_revoke_certificate(auto_id_identifier, signature)
343 }
344
345 #[pallet::call_index(2)]
347 #[pallet::weight(<T as Config>::Weights::deactivate_auto_id())]
348 pub fn deactivate_auto_id(
349 origin: OriginFor<T>,
350 auto_id_identifier: Identifier,
351 signature: Signature,
352 ) -> DispatchResult {
353 ensure_signed(origin)?;
354 Self::do_deactivate_auto_id(auto_id_identifier, signature)?;
355 Ok(())
356 }
357
358 #[pallet::call_index(3)]
360 #[pallet::weight(Pallet::<T>::max_renew_auto_id_weight())]
361 pub fn renew_auto_id(
362 origin: OriginFor<T>,
363 auto_id_identifier: Identifier,
364 req: RenewAutoId,
365 ) -> DispatchResultWithPostInfo {
366 ensure_signed(origin)?;
367 Self::do_renew_auto_id_certificate(auto_id_identifier, req)
368 }
369 }
370}
371
372impl<T: Config> Pallet<T> {
373 pub(crate) fn do_register_auto_id(req: RegisterAutoId) -> DispatchResultWithPostInfo {
374 let current_time = T::Time::now();
375 let (certificate, weight) = match req {
376 RegisterAutoId::X509(x509_req) => match x509_req {
377 RegisterAutoIdX509::Root {
378 certificate,
379 signature_algorithm,
380 signature,
381 } => {
382 let tbs_certificate = decode_tbs_certificate(certificate.clone())
383 .ok_or(Error::<T>::InvalidCertificate)?;
384 let req = SignatureVerificationRequest {
385 public_key_info: tbs_certificate.subject_public_key_info.clone(),
386 signature_algorithm,
387 data: certificate.0.clone(),
388 signature,
389 };
390 verify_signature(req).ok_or(Error::<T>::InvalidSignature)?;
391
392 ensure!(
393 tbs_certificate.validity.is_valid_at(current_time),
394 Error::<T>::ExpiredCertificate
395 );
396
397 (
398 Certificate::X509(X509Certificate {
399 issuer_id: None,
400 serial: tbs_certificate.serial,
401 subject_common_name: tbs_certificate.subject_common_name,
402 subject_public_key_info: tbs_certificate.subject_public_key_info,
403 validity: tbs_certificate.validity,
404 raw: certificate,
405 issued_serials: BTreeSet::from([tbs_certificate.serial]),
406 nonce: U256::zero(),
407 }),
408 T::Weights::register_issuer_auto_id(),
409 )
410 }
411 RegisterAutoIdX509::Leaf {
412 issuer_id,
413 certificate,
414 signature_algorithm,
415 signature,
416 } => {
417 let mut issuer_auto_id =
418 AutoIds::<T>::get(issuer_id).ok_or(Error::<T>::UnknownIssuer)?;
419 let issuer_public_key_info =
420 issuer_auto_id.certificate.subject_public_key_info();
421
422 ensure!(
423 issuer_auto_id.certificate.is_valid_at(current_time),
424 Error::<T>::ExpiredCertificate
425 );
426
427 let tbs_certificate = decode_tbs_certificate(certificate.clone())
428 .ok_or(Error::<T>::InvalidCertificate)?;
429
430 let req = SignatureVerificationRequest {
431 public_key_info: issuer_public_key_info,
432 signature_algorithm,
433 data: certificate.0.clone(),
434 signature,
435 };
436 verify_signature(req).ok_or(Error::<T>::InvalidSignature)?;
437 ensure!(
438 tbs_certificate.validity.is_valid_at(current_time),
439 Error::<T>::ExpiredCertificate
440 );
441
442 ensure!(
443 !CertificateRevocationList::<T>::get(issuer_id).is_some_and(|serials| {
444 serials.iter().any(|s| {
445 *s == issuer_auto_id.certificate.serial()
446 || *s == tbs_certificate.serial
447 })
448 }),
449 Error::<T>::CertificateRevoked
450 );
451
452 issuer_auto_id
453 .certificate
454 .issue_certificate_serial::<T>(tbs_certificate.serial)?;
455
456 AutoIds::<T>::insert(issuer_id, issuer_auto_id);
457
458 (
459 Certificate::X509(X509Certificate {
460 issuer_id: Some(issuer_id),
461 serial: tbs_certificate.serial,
462 subject_common_name: tbs_certificate.subject_common_name,
463 subject_public_key_info: tbs_certificate.subject_public_key_info,
464 validity: tbs_certificate.validity,
465 raw: certificate,
466 issued_serials: BTreeSet::from([tbs_certificate.serial]),
467 nonce: U256::zero(),
468 }),
469 T::Weights::register_leaf_auto_id(),
470 )
471 }
472 },
473 };
474
475 let auto_id_identifier = certificate.derive_identifier();
476 let auto_id = AutoId { certificate };
477
478 ensure!(
479 !AutoIds::<T>::contains_key(auto_id_identifier),
480 Error::<T>::AutoIdIdentifierAlreadyExists
481 );
482
483 AutoIds::<T>::insert(auto_id_identifier, auto_id);
484
485 Self::deposit_event(Event::<T>::NewAutoIdRegistered(auto_id_identifier));
486 Ok(Some(weight).into())
487 }
488
489 fn do_renew_auto_id_certificate(
490 auto_id_identifier: Identifier,
491 req: RenewAutoId,
492 ) -> DispatchResultWithPostInfo {
493 let current_time = T::Time::now();
494 let auto_id = AutoIds::<T>::get(auto_id_identifier).ok_or(Error::<T>::UnknownAutoId)?;
495 let RenewAutoId::X509(req) = req;
496 let tbs_certificate = decode_tbs_certificate(req.certificate.clone())
497 .ok_or(Error::<T>::InvalidCertificate)?;
498
499 let (issuer_public_key_info, weight) = match req.issuer_id {
500 None => {
501 CertificateRevocationList::<T>::mutate(auto_id_identifier, |serials| {
503 serials
504 .get_or_insert_with(BTreeSet::new)
505 .insert(auto_id.certificate.serial());
506 });
507 (
508 auto_id.certificate.subject_public_key_info(),
509 T::Weights::renew_issuer_auto_id(),
510 )
511 }
512 Some(issuer_id) => {
513 let mut issuer_auto_id =
514 AutoIds::<T>::get(issuer_id).ok_or(Error::<T>::UnknownIssuer)?;
515 let issuer_public_key_info = issuer_auto_id.certificate.subject_public_key_info();
516 ensure!(
517 issuer_auto_id.certificate.is_valid_at(current_time),
518 Error::<T>::ExpiredCertificate
519 );
520 ensure!(
521 !CertificateRevocationList::<T>::get(issuer_id).is_some_and(|serials| {
522 serials.iter().any(|s| {
523 *s == issuer_auto_id.certificate.serial()
524 || *s == tbs_certificate.serial
525 })
526 }),
527 Error::<T>::CertificateRevoked
528 );
529
530 issuer_auto_id
531 .certificate
532 .issue_certificate_serial::<T>(tbs_certificate.serial)?;
533
534 CertificateRevocationList::<T>::mutate(issuer_id, |serials| {
536 serials
537 .get_or_insert_with(BTreeSet::new)
538 .insert(auto_id.certificate.serial());
539 });
540
541 AutoIds::<T>::insert(issuer_id, issuer_auto_id);
542 (issuer_public_key_info, T::Weights::renew_leaf_auto_id())
543 }
544 };
545
546 let signature_req = SignatureVerificationRequest {
547 public_key_info: issuer_public_key_info,
548 signature_algorithm: req.signature_algorithm,
549 data: req.certificate.0.clone(),
550 signature: req.signature,
551 };
552 verify_signature(signature_req).ok_or(Error::<T>::InvalidSignature)?;
553 ensure!(
554 tbs_certificate.validity.is_valid_at(current_time),
555 Error::<T>::ExpiredCertificate
556 );
557
558 ensure!(
559 auto_id.certificate.subject_public_key_info()
560 == tbs_certificate.subject_public_key_info,
561 Error::<T>::PublicKeyMismatch
562 );
563
564 let updated_certificate = Certificate::X509(X509Certificate {
565 issuer_id: req.issuer_id,
566 serial: tbs_certificate.serial,
567 subject_common_name: tbs_certificate.subject_common_name,
568 subject_public_key_info: tbs_certificate.subject_public_key_info,
569 validity: tbs_certificate.validity,
570 raw: req.certificate,
571 issued_serials: auto_id.certificate.issued_serials(),
572 nonce: auto_id.certificate.nonce(),
573 });
574
575 ensure!(
576 auto_id_identifier == updated_certificate.derive_identifier(),
577 Error::<T>::AutoIdIdentifierMismatch
578 );
579
580 let updated_auto_id = AutoId {
581 certificate: updated_certificate,
582 };
583
584 AutoIds::<T>::insert(auto_id_identifier, updated_auto_id);
585
586 Self::deposit_event(Event::<T>::AutoIdRenewed(auto_id_identifier));
587 Ok(Some(weight).into())
588 }
589
590 fn do_verify_signature(
591 auto_id: &AutoId,
592 signing_data: CertificateAction,
593 signature: Signature,
594 ) -> DispatchResult {
595 let Signature {
596 signature_algorithm,
597 value: signature,
598 } = signature;
599 let req = SignatureVerificationRequest {
600 public_key_info: auto_id.certificate.subject_public_key_info(),
601 signature_algorithm,
602 data: signing_data.encode(),
603 signature,
604 };
605
606 verify_signature(req).ok_or(Error::<T>::InvalidSignature)?;
607 Ok(())
608 }
609
610 fn do_revoke_certificate(
611 auto_id_identifier: Identifier,
612 signature: Signature,
613 ) -> DispatchResultWithPostInfo {
614 let auto_id = AutoIds::<T>::get(auto_id_identifier).ok_or(Error::<T>::UnknownAutoId)?;
615
616 let (issuer_id, mut issuer_auto_id, weight) = match auto_id.certificate.issuer_id() {
617 Some(issuer_id) => (
618 issuer_id,
619 AutoIds::<T>::get(issuer_id).ok_or(Error::<T>::UnknownIssuer)?,
620 T::Weights::revoke_leaf_auto_id(),
621 ),
622 None => (
624 auto_id_identifier,
625 auto_id.clone(),
626 T::Weights::revoke_issuer_auto_id(),
627 ),
628 };
629
630 ensure!(
631 !CertificateRevocationList::<T>::get(issuer_id).is_some_and(|serials| {
632 serials.iter().any(|s| {
633 *s == auto_id.certificate.serial() || *s == issuer_auto_id.certificate.serial()
634 })
635 }),
636 Error::<T>::CertificateAlreadyRevoked
637 );
638
639 Self::do_verify_signature(
640 &issuer_auto_id,
641 CertificateAction {
642 id: auto_id_identifier,
643 nonce: issuer_auto_id.certificate.nonce(),
644 action_type: CertificateActionType::RevokeCertificate,
645 },
646 signature,
647 )?;
648
649 CertificateRevocationList::<T>::mutate(issuer_id, |serials| {
650 serials
651 .get_or_insert_with(BTreeSet::new)
652 .insert(auto_id.certificate.serial());
653 });
654
655 issuer_auto_id.certificate.inc_nonce::<T>()?;
656 AutoIds::<T>::insert(issuer_id, issuer_auto_id);
657
658 Self::deposit_event(Event::<T>::CertificateRevoked(auto_id_identifier));
659 Ok(Some(weight).into())
660 }
661
662 fn do_deactivate_auto_id(
663 auto_id_identifier: Identifier,
664 signature: Signature,
665 ) -> DispatchResult {
666 let auto_id = AutoIds::<T>::get(auto_id_identifier).ok_or(Error::<T>::UnknownIssuer)?;
667 Self::do_verify_signature(
668 &auto_id,
669 CertificateAction {
670 id: auto_id_identifier,
671 nonce: auto_id.certificate.nonce(),
672 action_type: CertificateActionType::DeactivateAutoId,
673 },
674 signature,
675 )?;
676
677 AutoIds::<T>::remove(auto_id_identifier);
679
680 Self::deposit_event(Event::<T>::AutoIdDeactivated(auto_id_identifier));
681 Ok(())
682 }
683
684 fn max_register_auto_id_weight() -> Weight {
685 T::Weights::register_issuer_auto_id().max(T::Weights::register_leaf_auto_id())
686 }
687
688 fn max_revoke_auto_id_weight() -> Weight {
689 T::Weights::revoke_issuer_auto_id().max(T::Weights::revoke_leaf_auto_id())
690 }
691
692 fn max_renew_auto_id_weight() -> Weight {
693 T::Weights::renew_issuer_auto_id().max(T::Weights::renew_leaf_auto_id())
694 }
695}