Skip to main content
Version: 1.0

Access control

Access control allows making certain parts of a program accessible/visible and making other parts inaccessible/invisible.

In Cadence, access control consists of:

  1. Access control on objects in account storage, using capability security.

A user is not able to access an object unless they own the object or have a reference to that object. This means that nothing is truly public by default.

Other accounts can not read or write the objects in an account unless the owner of the account has granted them access by providing references to the objects.

This kind of access control is covered in the pages on capabilities and capability management.

  1. Access control within contracts and objects, using access modifiers (access keyword).

This page covers the second part of access control, using access modifiers.

All declarations, such as function, composite types, and fields, must be prefixed with an access modifier, using the access keyword.

The access modifier determines where the declaration is accessible/visible. Fields can only be assigned to and mutated from within the same or inner scope.

For example, to make a function publicly accessible (access(all) is explained below):


_10
access(all)
_10
fun test() {}

There are five levels of access control:

  • Public access means the declaration is accessible/visible in all scopes. This includes the current scope, inner scopes, and the outer scopes.

    A declaration is made publicly accessible using the access(all) modifier.

    For example, a public field in a type can be accessed on an instance of the type in an outer scope.

  • Entitled access means the declaration is only accessible/visible to the owner of the object, or to references that are authorized to the required entitlements.

    A declaration is made accessible through entitlements by using the access(E) syntax, where E is a set of one or more entitlements, or a single entitlement mapping.

    A reference is considered authorized to an entitlement if that entitlement appears in the auth portion of the reference type.

    For example, an access(E, F) field on a resource R can only be accessed by an owned (@R-typed) value, or a reference to R that is authorized to the E and F entitlements (auth(E, F) &R).

  • Account access means the declaration is only accessible/visible in the scope of the entire account where it is defined. This means that other contracts in the account are able to access it.

    A declaration is made accessible by code in the same account, for example other contracts, by using the access(account) keyword.

  • Contract access means the declaration is only accessible/visible in the scope of the contract that defined it. This means that other declarations that are defined in the same contract can access it, but not other contracts in the same account.

    A declaration is made accessible by code in the same contract by using the access(contract) keyword.

  • Private access means the declaration is only accessible/visible in the current and inner scopes.

    A declaration is made accessible by code in the same containing type by using the access(self) keyword.

    For example, an access(self) field can only be accessed by functions of the type is part of, not by code in an outer scope.

To summarize the behavior for variable declarations, constant declarations, and fields:

Declaration kindAccess modifierAccessible inAssignable inMutable in
letaccess(self)Current and innerNoneCurrent and inner
letaccess(contract)Current, inner, and containing contractNoneCurrent and inner
letaccess(account)Current, inner, and other contracts in same accountNoneCurrent and inner
letaccess(all)AllNoneCurrent and inner
letaccess(E)All with required entitlementsNoneCurrent and inner
varaccess(self)Current and innerCurrent and innerCurrent and inner
varaccess(contract)Current, inner, and containing contractCurrent and innerCurrent and inner
varaccess(account)Current, inner, and other contracts in same accountCurrent and innerCurrent and inner
varaccess(all)AllCurrent and innerCurrent and inner
varaccess(E)All with required entitlementsCurrent and innerCurrent and inner

Declarations of composite types must be public. However, even though the declarations/types are publicly visible, resources can only be created, and events can only be emitted from inside the contract they are declared in.


_10
// Declare a private constant, inaccessible/invisible in outer scope.
_10
//
_10
access(self)
_10
let a = 1
_10
_10
// Declare a public constant, accessible/visible in all scopes.
_10
//
_10
access(all)
_10
let b = 2


_99
// Declare a public struct, accessible/visible in all scopes.
_99
//
_99
access(all)
_99
struct SomeStruct {
_99
_99
// Declare a private constant field which is only readable
_99
// in the current and inner scopes.
_99
//
_99
access(self)
_99
let a: Int
_99
_99
// Declare a public constant field which is readable in all scopes.
_99
//
_99
access(all)
_99
let b: Int
_99
_99
// Declare a private variable field which is only readable
_99
// and writable in the current and inner scopes.
_99
//
_99
access(self)
_99
var c: Int
_99
_99
// Declare a public variable field which is not settable,
_99
// so it is only writable in the current and inner scopes,
_99
// and readable in all scopes.
_99
//
_99
access(all)
_99
var d: Int
_99
_99
// Arrays and dictionaries declared without (set) cannot be
_99
// mutated in external scopes
_99
access(all)
_99
let arr: [Int]
_99
_99
// The initializer is omitted for brevity.
_99
_99
// Declare a private function which is only callable
_99
// in the current and inner scopes.
_99
//
_99
access(self)
_99
fun privateTest() {
_99
// ...
_99
}
_99
_99
// Declare a public function which is callable in all scopes.
_99
//
_99
access(all)
_99
fun publicTest() {
_99
// ...
_99
}
_99
_99
// The initializer is omitted for brevity.
_99
_99
}
_99
_99
let some = SomeStruct()
_99
_99
// Invalid: cannot read private constant field in outer scope.
_99
//
_99
some.a
_99
_99
// Invalid: cannot set private constant field in outer scope.
_99
//
_99
some.a = 1
_99
_99
// Valid: can read public constant field in outer scope.
_99
//
_99
some.b
_99
_99
// Invalid: cannot set public constant field in outer scope.
_99
//
_99
some.b = 2
_99
_99
// Invalid: cannot read private variable field in outer scope.
_99
//
_99
some.c
_99
_99
// Invalid: cannot set private variable field in outer scope.
_99
//
_99
some.c = 3
_99
_99
// Valid: can read public variable field in outer scope.
_99
//
_99
some.d
_99
_99
// Invalid: cannot set public variable field in outer scope.
_99
//
_99
some.d = 4
_99
_99
// Invalid: cannot mutate a public field in outer scope.
_99
//
_99
some.f.append(0)
_99
_99
// Invalid: cannot mutate a public field in outer scope.
_99
//
_99
some.f[3] = 1
_99
_99
// Valid: can call non-mutating methods on a public field in outer scope
_99
some.f.contains(0)

Entitlements​

Entitlements provide granular access control to each member of a composite. Entitlements are declared using the syntax entitlement E, where E is the name of the entitlement.

For example, the following code declares two entitlements called E and F:


_10
entitlement E
_10
entitlement F

Entitlements can be imported from other contracts and used the same way as other types. When using entitlements defined in another contract, the same qualified name syntax is used as for other types:


_10
contract C {
_10
entitlement E
_10
}

Outside of C, E is used with C.E syntax.

Entitlements exist in the same namespace as types, so if a contract declares a resource called R, it is impossible to declare an entitlement that is also called R.

Entitlements can be used in access modifiers of composite members (fields and functions) to specify which references to those composites are allowed to access those members.

An access modifier can include more than one entitlement, joined with either an |, to indicate disjunction ("or"), or a ,, to indicate conjunction ("and"). The two kinds of separators cannot be combined in the same set.

For example:


_18
access(all)
_18
resource SomeResource {
_18
_18
// requires a reference to have an `E` entitlement to read this field
_18
access(E)
_18
let a: Int
_18
_18
// requires a reference to have either an `E` OR an `F` entitlement to read this field.
_18
access(E | F)
_18
let b: Int
_18
_18
// requires a reference to have both an `E` AND an `F` entitlement to read this field
_18
access(E, F)
_18
let c: Int
_18
_18
// intializers omitted for brevity
_18
// ...
_18
}

Assuming the following constants exist, which have owned or reference types:


_10
let r: @SomeResource = // ...
_10
let refE: auth(E) &SomeResource = // ...
_10
let refF: auth(F) &SomeResource = // ...
_10
let refEF: auth(E, F) &SomeResource = // ...
_10
let refEOrF: auth(E | F) &SomeResource = // ...

The references can be used as follows:


_34
// valid, because `r` is owned and thus is "fully entitled"
_34
r.a
_34
// valid, because `r` is owned and thus is "fully entitled"
_34
r.b
_34
// valid, because `r` is owned and thus is "fully entitled"
_34
r.c
_34
_34
// valid, because `refE` has an `E` entitlement as required
_34
refE.a
_34
// valid, because `refE` has one of the two required entitlements
_34
refE.b
_34
// invalid, because `refE` only has one of the two required entitlements
_34
refE.c
_34
_34
// invalid, because `refF` has an `E` entitlement, not an `F`
_34
refF.a
_34
// valid, because `refF` has one of the two required entitlements
_34
refF.b
_34
// invalid, because `refF` only has one of the two required entitlements
_34
refF.c
_34
_34
// valid, because `refEF` has an `E` entitlement
_34
refEF.a
_34
// valid, because `refEF` has both of the two required entitlements
_34
refEF.b
_34
// valid, because `refEF` has both of the two required entitlements
_34
refEF.c
_34
_34
// invalid, because `refEOrF` might not have an `E` entitlement (it may have `F` instead)
_34
refEOrF.a
_34
// valid, because `refEOrF` has one of the two entitlements necessary
_34
refEOrF.b
_34
// invalid, because `refEOrF` is only known to have one of the two required entitlements
_34
refEOrF.c

Note particularly in this example how the owned value r can access all entitled members on SomeResource. Owned values are not affected by entitled declarations.

Further details about authorized references can be found here.

Entitlement mappings​

Entitlement mappings are a way to statically declare how entitlements are propagated from parents to child objects in a nesting hierarchy.

When objects have fields that are child objects, entitlement mappings can be used to grant access to the inner object based on the entitlements of the reference to the parent object.

Consider the following example, which uses entitlements to control access to an inner resource:


_43
entitlement OuterEntitlement
_43
entitlement InnerEntitlement
_43
_43
resource InnerResource {
_43
_43
access(all)
_43
fun foo() { ... }
_43
_43
access(InnerEntitlement)
_43
fun bar() { ... }
_43
}
_43
_43
resource OuterResource {
_43
access(self)
_43
let childResource: @InnerResource
_43
_43
init(childResource: @InnerResource) {
_43
self.childResource <- childResource
_43
}
_43
_43
// The parent resource has to provide two accessor functions
_43
// which return a reference to the inner resource.
_43
//
_43
// If the reference to the outer resource is unauthorized
_43
// and does not have the OuterEntitlement entitlement,
_43
// the outer resource allows getting an unauthorized reference
_43
// to the inner resource.
_43
//
_43
// If the reference to the outer resource is authorized
_43
// and it has the OuterEntitlement entitlement,
_43
// the outer resource allows getting an authorized reference
_43
// to the inner resource.
_43
_43
access(all)
_43
fun getPubRef(): &InnerResource {
_43
return &self.childResource as &InnerResource
_43
}
_43
_43
access(OuterEntitlement)
_43
fun getEntitledRef(): auth(InnerEntitlement) &InnerResource {
_43
return &self.childResource as auth(InnerEntitlement) &InnerResource
_43
}
_43
}

With this pattern, it is possible to store a InnerResource in an OuterResource, and create different ways to access that nested resource depending on the entitlement one possesses.

An unauthorized reference to OuterResource can only be used to call the getPubRef function, and thus can only obtain an unauthorized reference to InnerResource. That reference to the InnerResource then only allows calling the function foo, which is publicly accessible, but not function bar, as it needs the InnerEntitlement entitlement, which is not granted.

However an OuterEntitlement-authorized reference to the OuterResource can be used to call the getEntitledRef function, which returns a InnerEntitlement-authorized reference to InnerResource, which in turn can be used to call function bar.

This pattern is functional, but it is unfortunate that the accessor functions to InnerResource have to be "duplicated".

Entitlement mappings should be used to avoid this duplication.

Entitlement mappings are declared using the syntax:


_10
entitlement mapping M {
_10
// ...
_10
}

Where M is the name of the mapping.

The body of the mapping contains zero or more rules of the form A -> B, where A and B are entitlements. Each rule declares that, given a reference with the entitlement on the left, a reference with the entitlement on the right is produced.

An entitlement mapping thus defines a function from an input set of entitlements (called the domain) to an output set (called the range or the image).

Using entitlement mappings, the above example could be more concisely written as:


_51
entitlement OuterEntitlement
_51
entitlement InnerEntitlement
_51
_51
// Specify a mapping for entitlements called `OuterToInnerMap`,
_51
// which maps the entitlement `OuterEntitlement` to the entitlement `InnerEntitlement`.
_51
entitlement mapping OuterToInnerMap {
_51
OuterEntitlement -> InnerEntitlement
_51
}
_51
_51
resource InnerResource {
_51
_51
access(all)
_51
fun foo() { ... }
_51
_51
access(InnerEntitlement)
_51
fun bar() { ... }
_51
}
_51
_51
resource OuterResource {
_51
// Use the entitlement mapping `OuterToInnerMap`.
_51
//
_51
// This declares that when the field `childResource` is accessed
_51
// using a reference authorized with the entitlement `OuterEntitlement`,
_51
// then a reference with the entitlement `InnerEntitlement` is returned.
_51
//
_51
// This is equivalent to the two accessor functions
_51
// that were necessary in the previous example.
_51
//
_51
access(mapping OuterToInnerMap)
_51
let childResource: @InnerResource
_51
_51
init(childResource: @InnerResource) {
_51
self.childResource <- childResource
_51
}
_51
_51
// No accessor functions are needed.
_51
}
_51
_51
// given some value `r` of type `@OuterResource`
_51
_51
let pubRef = &r as &OuterResource
_51
let pubInnerRef = pubRef.childResource // has type `&InnerResource`
_51
_51
let entitledRef = &r as auth(OuterEntitlement) &OuterResource
_51
let entitledInnerRef = entitledRef.childResource // has type `auth(InnerEntitlement) &InnerResource`,
_51
// as `OuterEntitlement` is defined to map to `InnerEntitlement`.
_51
_51
// `r` is an owned value, and is thus considered "fully-entitled" to `OuterResource`,
_51
// so this access yields a value authorized to the entire image of `OuterToInnerMap`,
_51
// in this case `InnerEntitlement`, and thus can call `bar`
_51
r.childResource.bar()

Entitlement mappings can be used either in accessor functions (as in the example above), or in fields whose types are either references, or containers (composite types, dictionaries, and arrays).

Entitlement mappings need not be 1:1. It is valid to define a mapping where many inputs map to the same output, or where one input maps to many outputs.

Entitlement mappings preserve the "kind" of the set they are mapping. That is, mapping a conjunction ("and") set produces a conjunction set, and mapping a disjunction ("or") set produces a disjunction set.

Because entitlement separators cannot be combined in the same set, attempting to map disjunction ("or") sets through certain complex mappings can result in a type error.

For example, given the following entitlement mapping:


_10
entitlement mapping M {
_10
A -> B
_10
A -> C
_10
D -> E
_10
}

Attempting to map (A | D) through M will fail, since A should map to (B, C) and D should map to E, but these two outputs cannot be combined into a disjunction ("or") set.

A good example for how entitlement mappings can be used is the Account type.

The Identity entitlement mapping​

Identity is a special built-in entitlement mapping that maps every input to itself as the output. Any entitlement set passed through the Identity map will come out unchanged in the output.

For instance:


_24
entitlement X
_24
_24
resource InnerResource {
_24
// ...
_24
}
_24
_24
resource OuterResource {
_24
access(mapping Identity)
_24
let childResource: @InnerResource
_24
_24
access(mapping Identity)
_24
getChildResource(): auth(mapping Identity) &InnerResource {
_24
return &self.childResource
_24
}
_24
_24
init(childResource: @InnerResource) {
_24
self.childResource <- childResource
_24
}
_24
}
_24
_24
fun example(outerRef: auth(X) &OuterResource) {
_24
let innerRef = outerRef.childResource // `innerRef` has type `auth(X) &InnerResource`,
_24
// as `outerRef` was authorized with entitlement `X`
_24
}

One important point to note about the Identity mapping, however, is that its full output range is unknown, and theoretically infinite. Because of that, accessing an Identity-mapped field or function with an owned value will yield an empty output set.

For example, calling getChildResource() on an owned OuterResource value, will produce an unauthorized &InnerResource reference.

Mapping composition​

Entitlement mappings can be composed. In the definition of an entitlement mapping, it is possible to include the definition of one or more other mappings, to copy over their mapping relations.

An entitlement mapping is included into another entitlement mapping using the include M syntax, where M is the name of the entitlement mapping to be included.

In general, an include M statement in the definition of an entitlement mapping N is equivalent to simply copy-pasting all the relations defined in M into N's definition.

Support for include is provided primarily to reduce code-reuse and promote composition.

For example:


_14
entitlement mapping M {
_14
X -> Y
_14
Y -> Z
_14
}
_14
_14
entitlement mapping N {
_14
E -> F
_14
}
_14
_14
entitlement mapping P {
_14
include M
_14
include N
_14
F -> G
_14
}

The entitlement mapping P includes all of the relations defined in M and N, along with the additional relations defined in its own definition.

It is also possible to include the Identity mapping. Any mapping M that includes the Identity mapping will map its input set to itself, along with any additional relations defined in the mapping, or in other included mappings.

For instance:


_10
entitlement mapping M {
_10
include Identity
_10
X -> Y
_10
}

The mapping M maps the entitlement set (X) to (X, Y), and (Y) to (Y).

Includes that produce a cyclical mapping are rejected by the type-checker.

Built-in mutability entitlements​

A prominent use-case of entitlements is to control access to object based on mutability.

For example, in a composite, the author would want to control the access to certain fields to be read-only, and some fields to be mutable, etc.

In order to support this, the following built-in entitlements can be used:

  • Insert
  • Remove
  • Mutate

These are primarily used by the built-in array and dictionary functions, but are available to be used in access modifiers of any declaration.

While Cadence does not support entitlement composition or inheritance, the Mutate entitlement is intended to be used as an equivalent form to the conjunction of the (Insert, Remove) entitlement set.