Bridge permissions management
To effectively utilize the Calimero bridge for token transfers, including FTs, NFTs, and cross-shard calls, it is crucial to set up permissions properly. Permissions are managed on a connector basis, and initially, all connectors are denied for all accounts. Here's an overview of how permissions are managed for each type of connector:
FT Connector Permissions
When deploying FT Bridge contracts, all FT bridging is denied by default in both directions. To allow bridging from NEAR to Calimero, you need to add a regex rule on the source side (NEAR) that permits the desired Account ID to bridge FTs to the destination side (Calimero). The transaction for adding a rule on the FT connector's source side needs to be signed by the FT connector on the same side.
For example, let's say you want to bridge FT usdn.testnet
with Account ID john.testnet
from NEAR to Calimero. You can add a regex rule to allow this bridging. Here are some examples of how to set the rule:
john\.testnet
: Onlyjohn.testnet
can bridge FTs with this rule (e.g.,doe.john.testnet
cannot bridge FTs).*john\.testnet
: Any account ending withjohn.testnet
can bridge FTs.*\.john\.testnet
: Any sub-account ofjohn.testnet
can bridge FTs.*john.*
: Any account containingjohn
in its ID can bridge FTs.*\.testnet
: Any Testnet account can bridge FTs
When the ft_on_transfer
method is called on the FT connector (as a result of the ft_transfer_call
call on an FT contract), it checks if the original account has bridging permissions. An account has bridging permissions if it matches any allow rule. If it doesn't match any rule, it is denied for bridging.
Keep in mind that when adding an allow rule for the FT connector, any Account ID matching at least one allow rule can bridge assets.
NFT Connector Permissions
NFT connector permissions are managed in a similar way to FT connectors. Initially, all accounts are denied for bridging NFTs. With the NFT connectors' key from the destination side, regex rules can be added, and transactions are signed accordingly. When the nft_on_transfer
method is called on the NFT connector (as a result of the nft_transfer_call
call on an NFT contract), it checks if the original account has bridging permissions. The Account ID needs to match at least one NFT allow rule on that side.
Cross Shard Call (XSC) Connector Permissions
XSC permissions are more granular due to the sensitivity of Cross Shard Calls. Permissions for XSC are managed separately for NEAR and Calimero sides, similar to FT and NFT permissions.
XSC permissions consist of two parts: an account allow list (similar to FT and NFT) and a deny list of account-contract pairs. Here's how XSC permissions are managed:
- Initially, all accounts are denied from calling any smart contract on the other side.
- To make a cross-shard call, an account on the NEAR side (e.g., Account ID
john.testnet
) needs to pass both the allow list and the deny list checks. - The account must match at least one allow regex rule for XSC.
- Additionally, the account-contract pair should not match any deny regex rule pair to be allowed to make a cross-shard call.
For example, let's consider the following rules:
- Allow list: [
.*apple.*
,.*banana.*
] (any account containingapple
orbanana
) - Deny list (pairs of contract regex rule and account regex rule): [(
.*secret.*
,.*
)] (no account can call any smart contract withsecret
in its name)
Now, let's examine some XSC examples:
- Account ID
orange.testnet
callscontract.calimero.testnet
: This call is denied because it doesn't pass the allow list check (no matching allow regex rule fororange.testnet
). - Account ID
one.apple.testnet
callscontract.calimero.testnet
: This call is allowed. It passes the allow list check (matches.*apple.*
) and doesn't match any rule pair from the deny list (e.g.,contract.calimero.testnet
doesn't match.*secret.*
). - Account ID
one.apple.testnet
callssecret.contract.calimero.testnet
: This call is denied. It passes the allow list check (matches.*apple.*
), but it matches a deny list rule pair (secret.contract.calimero.testnet
matches.*secret.*
, andone.apple.testnet
matches.*
).
If you prefer to manage XSC permissions in the same way as FT and NFT permissions, you can simply avoid using the deny list.
Bridge Permissions Management
You can manage bridge permissions through various methods:
Calimero Console UI: You can use the Calimero Console UI to manage permissions effectively. This provides a user-friendly interface for setting up and modifying bridge permissions.
Calimero Bridge SDK: The Calimero Bridge SDK offers a programmatic way to manage bridge permissions. You can utilize the SDK's functions to automate permission management tasks and integrate them into your application.
CLI: Permissions can also be managed directly through the CLI. This method is suitable for users who prefer command-line interactions and want to have more control over the permission management process.
Security and Motivation
Setting up bridge permissions properly is essential for several reasons:
Preventing Malicious Bridge Usage: Proper permissions help prevent malicious entities from bridging FTs and NFTs into the private shard. By carefully controlling permissions, you can mitigate potential security risks.
Protecting Privacy in Cross Shard Calls: The Calimero private sharding solution aims to preserve customer privacy. By managing XSC permissions, you can ensure that public network users (NEAR) cannot access sensitive information stored in contracts on the private shard.
Avoiding Unnecessary Gas Fees: Misconfigured permissions can result in paying gas fees on the destination chain (e.g., NEAR) for calls initiated by malicious actors. By setting strict permissions, you can avoid financial harm caused by excessive bridging operations.
It's crucial to consider the motivation of malicious actors who may attempt to deplete connectors' funds on the public side (NEAR). When a bridging operation is called, the connector on the destination side initially pays gas fees for those calls, which are covered by the shard owner. Improperly set permissions can enable malicious actors to initiate a large number of bridging operations, leading to financial harm for the shard owner.
Additionally, there is a risk of a malicious actor gaining control of a small amount of assets through the gas fees paid for malicious Cross Shard Calls. To exploit this, the attacker would need access to the Calimero shard and deploy a smart contract on NEAR that receives a portion of the gas fees. Properly managing bridge permissions helps mitigate such risks.