Access Control NEAR

Access Control NEAR is a library for implementing role-based access control model in NEAR smart contracts. It is partially inspired by OpenZeppelin's access control implementation.

Architecture

The Roles map consists of Role to Role Data mapping. New members are added to the members set by inserting new AccountId. Each role has an Admin Role, whose members are allowed to perform privileged actions on the role that derives it. Default admin_role for all created roles is default_admin

diagram1.png

diagram2.png

Methods

All methods, by default, are private. The reason behind it is to let the user allow methods that are necessary to be used on-chain. Some methods should be kept private since they carry privileged actions that anyone can call. Therefore, they should be only used within the smart contract if necessary.

You can find the list of all available methods below. Private or Helper should NOT be made public to be used on-chain. Public methods can be made public, respectively.

Public Methods

```rust fn has_role(&self, role: &String, account: &AccountId) -> bool;

fn check_role(&self, role: &String, account: &AccountId);

fn getroleadmin(&self, role: &String) -> String;

fn getaccountroles(&self, account: &AccountId) -> Vec;

fn grant_role(&mut self, role: &String, account: &AccountId);

fn revoke_role(&mut self, role: &String, account: &AccountId);

fn setadminrole(&mut self, role: &String, admin_role: &String);

fn assert_role(&self, role: &String); ```

Private Methods

rust fn setup_account_role(&mut self, role: &String, account: &AccountId);

Helper Methods

```rust fn add_role(&mut self, role: &String);

fn deleterolemember(&mut self, role: &String, account: &AccountId);

fn addrolemember(&mut self, role: &String, account: &AccountId); ```

Usage

You can run the test application in the example folder, which is a fork of StatusMessage by calling ./build.sh and then ./deploy.sh . Please update ./deploy.sh to have your accounts. For your own projects you have to include both access_control_near and access_control_near_attribute crates.

The only thing needed is to add #[access_control] attribute macro to your main struct to begin using methods from this library. Please also note that #[access_control] macro already includes #[derive(BorshDeserialize, BorshSerialize, PanicOnDefault)] . Therefore, please do not derive it the second time on your main struct, where the #[access_control] is used.

```rust

[near_bindgen]

[access_control]

pub struct StatusMessage { records: LookupMap, } ```

Then, to begin using methods in the Access Control NEAR and setup initial roles, you have to first call the init!() macro in your constructor and then setup roles you want to use.

```rust const DEFAULTADMIN: &str = "defaultadmin"; const MINTER: &str = "minter"; const MANAGER: &str = "manager";

.....

[near_bindgen]

impl StatusMessage { #[init] pub fn new(owner: AccountId, minter: AccountId, manager: AccountId) -> Self { assert!(!env::state_exists(), "The contract is already initialized.");

    let mut constructor = init!(Self {
        records: LookupMap::new(StorageKey::Records.into_bytes()),
    });

    constructor.setup_account_role(&DEFAULT_ADMIN.to_string(), &owner);
    constructor.setup_account_role(&MINTER.to_string(), &minter);
    constructor.setup_account_role(&MANAGER.to_string(), &manager);

    constructor.set_admin_role(&MINTER.to_string(), &MANAGER.to_string());

    constructor
}

```

That's all! From now on, you can directly use AC NEAR methods within your smart contract. To make some methods public, you can add a public wrapper around them.

```rust pub fn pubgetaccountroles(&self, account: &AccountId) -> Vec { self.getaccount_roles(account) }

pub fn pub_grant_role(&mut self, role: &String, account: &AccountId) {
    self.grant_role(role, account)
}

pub fn pub_has_role(&self, role: &String, account: &AccountId) -> bool {
    self.has_role(role, account)
}

pub fn pub_check_role(&self, role: &String, account: &AccountId) {
    self.check_role(role, account)
}

pub fn pub_get_role_admin(&self, role: &String) -> String {
    self.get_role_admin(role)
}

pub fn pub_revoke_role(&mut self, role: &String, account: &AccountId) {
    self.revoke_role(role, account)
}

pub fn pub_set_admin_role(&mut self, role: &String, admin_role: &String) {
    self.set_admin_role(role, admin_role)
}

pub fn pub_assert_role(&self, role: &String) {
    self.assert_role(role)
}

```

Future Plans

Licence