diff options
| author | Yigit Sever | 2022-04-11 19:01:42 +0300 | 
|---|---|---|
| committer | Yigit Sever | 2022-04-11 19:01:42 +0300 | 
| commit | 426e83ec6fba028692bed334803ae9d3a645cb18 (patch) | |
| tree | a92c2d62f54e28493d1d3b3ddfc185c1ed5cf4a5 /src | |
| parent | 04c3b4597a995d73e6925c5391bfa27d27f298b7 (diff) | |
| download | gradecoin-426e83ec6fba028692bed334803ae9d3a645cb18.tar.gz gradecoin-426e83ec6fba028692bed334803ae9d3a645cb18.tar.bz2 gradecoin-426e83ec6fba028692bed334803ae9d3a645cb18.zip  | |
[WIP] Spring cleaning
Diffstat (limited to 'src')
| -rw-r--r-- | src/bin/main.rs | 15 | ||||
| -rw-r--r-- | src/block.rs | 92 | ||||
| -rw-r--r-- | src/custom_filters.rs | 5 | ||||
| -rw-r--r-- | src/db.rs | 159 | ||||
| -rw-r--r-- | src/handlers.rs | 158 | ||||
| -rw-r--r-- | src/lib.rs | 35 | ||||
| -rw-r--r-- | src/main.rs | 52 | ||||
| -rw-r--r-- | src/routes.rs | 8 | ||||
| -rw-r--r-- | src/schema.rs | 377 | ||||
| -rw-r--r-- | src/student.rs | 96 | 
10 files changed, 481 insertions, 516 deletions
diff --git a/src/bin/main.rs b/src/bin/main.rs deleted file mode 100644 index f1fa908..0000000 --- a/src/bin/main.rs +++ /dev/null  | |||
| @@ -1,15 +0,0 @@ | |||
| 1 | use gradecoin::routes::consensus_routes; | ||
| 2 | use gradecoin::schema::create_database; | ||
| 3 | |||
| 4 | #[tokio::main] | ||
| 5 | async fn main() { | ||
| 6 | log4rs::init_file("log.conf.yml", Default::default()).unwrap(); | ||
| 7 | |||
| 8 | let db = create_database(); | ||
| 9 | |||
| 10 | let api = consensus_routes(db); | ||
| 11 | |||
| 12 | // Start the server | ||
| 13 | let point = ([127, 0, 0, 1], 8080); | ||
| 14 | warp::serve(api).run(point).await; | ||
| 15 | } | ||
diff --git a/src/block.rs b/src/block.rs new file mode 100644 index 0000000..e707779 --- /dev/null +++ b/src/block.rs  | |||
| @@ -0,0 +1,92 @@ | |||
| 1 | //! # Data Representations | ||
| 2 | //! | ||
| 3 | //! We need persistence for [`Block`]s and [`User`]s, not so much for [`Transaction`]s | ||
| 4 | //! | ||
| 5 | //! There are around 30 students, a full fledged database would be an overkill (for next year?) | ||
| 6 | //! | ||
| 7 | //! Pending transactions are held in memory, these are cleared with every new block | ||
| 8 | //! Only the last block is held in memory, every block is written to a file | ||
| 9 | //! Users are held in memory and they're also backed up to text files | ||
| 10 | use chrono::{NaiveDate, NaiveDateTime}; | ||
| 11 | use serde::{Deserialize, Serialize}; | ||
| 12 | use std::{string::String, vec::Vec}; | ||
| 13 | |||
| 14 | pub type Fingerprint = String; | ||
| 15 | pub type Id = String; | ||
| 16 | |||
| 17 | /// A block that was proposed with `transaction_list` and `nonce` | ||
| 18 | /// that made `hash` valid, 6 zeroes at the left hand side of the hash (24 bytes) | ||
| 19 | /// | ||
| 20 | /// We are mining using blake2s algorithm, which produces 256 bit hashes. | ||
| 21 | /// Hash/second is roughly 20x10^3. | ||
| 22 | /// | ||
| 23 | /// <https://serde.rs/container-attrs.html> might be valuable to normalize the | ||
| 24 | /// serialize/deserialize conventions as these will be hashed | ||
| 25 | /// | ||
| 26 | #[derive(Serialize, Deserialize, Debug, PartialEq)] | ||
| 27 | pub struct Block { | ||
| 28 | #[serde(skip_serializing_if = "Vec::is_empty")] | ||
| 29 | pub transaction_list: Vec<Fingerprint>, | ||
| 30 | pub nonce: u32, | ||
| 31 | pub timestamp: NaiveDateTime, | ||
| 32 | pub hash: String, | ||
| 33 | } | ||
| 34 | |||
| 35 | impl Default for Block { | ||
| 36 | fn default() -> Self { | ||
| 37 | Block { | ||
| 38 | transaction_list: vec!["gradecoin_bank".to_owned()], | ||
| 39 | nonce: 0, | ||
| 40 | timestamp: NaiveDate::from_ymd(2022, 4, 11).and_hms(20, 45, 00), | ||
| 41 | hash: String::from("not_actually_mined"), | ||
| 42 | } | ||
| 43 | } | ||
| 44 | } | ||
| 45 | |||
| 46 | /// For prototyping and letting serde handle everything json | ||
| 47 | #[derive(Serialize, Deserialize, Debug, PartialEq)] | ||
| 48 | pub struct NakedBlock { | ||
| 49 | #[serde(skip_serializing_if = "Vec::is_empty", default)] | ||
| 50 | pub transaction_list: Vec<Fingerprint>, | ||
| 51 | pub nonce: u32, | ||
| 52 | pub timestamp: NaiveDateTime, | ||
| 53 | } | ||
| 54 | |||
| 55 | /// A transaction between `source` and `target` that moves `amount` | ||
| 56 | #[derive(Serialize, Deserialize, Debug, Clone, PartialEq)] | ||
| 57 | pub struct Transaction { | ||
| 58 | pub source: Fingerprint, | ||
| 59 | pub target: Fingerprint, | ||
| 60 | pub amount: u16, | ||
| 61 | pub timestamp: NaiveDateTime, | ||
| 62 | } | ||
| 63 | |||
| 64 | /// A JWT Payload/Claims representation | ||
| 65 | /// | ||
| 66 | /// <https://tools.ietf.org/html/rfc7519#section-4.1> | ||
| 67 | /// | ||
| 68 | /// - `tha`: Transaction Hash, String (custom field) | ||
| 69 | /// - `iat`: Issued At, Unix Time, epoch | ||
| 70 | /// - `exp`: Expiration Time, epoch | ||
| 71 | #[derive(Debug, Serialize, Deserialize, PartialEq)] | ||
| 72 | pub struct Claims { | ||
| 73 | pub tha: String, | ||
| 74 | pub iat: usize, | ||
| 75 | pub exp: usize, | ||
| 76 | } | ||
| 77 | |||
| 78 | /// The plaintext of the initial user authentication request | ||
| 79 | #[derive(Serialize, Deserialize, Debug, PartialEq)] | ||
| 80 | pub struct AuthRequest { | ||
| 81 | pub student_id: String, | ||
| 82 | pub passwd: String, | ||
| 83 | pub public_key: String, | ||
| 84 | } | ||
| 85 | |||
| 86 | /// Ciphertext of the initial authentication request, or what we will receive | ||
| 87 | #[derive(Serialize, Deserialize, Debug)] | ||
| 88 | pub struct InitialAuthRequest { | ||
| 89 | pub c: String, | ||
| 90 | pub iv: String, | ||
| 91 | pub key: String, | ||
| 92 | } | ||
diff --git a/src/custom_filters.rs b/src/custom_filters.rs index 7e0cae5..5bf284b 100644 --- a/src/custom_filters.rs +++ b/src/custom_filters.rs  | |||
| @@ -1,5 +1,6 @@ | |||
| 1 | /// Functions that extracts Structs to be used in warp routines | 1 | //! # Functions that extracts Structs to be used in warp routines | 
| 2 | use crate::schema::{Block, Db, InitialAuthRequest, Transaction}; | 2 | use crate::block::{Block, InitialAuthRequest, Transaction}; | 
| 3 | use crate::Db; | ||
| 3 | use std::convert::Infallible; | 4 | use std::convert::Infallible; | 
| 4 | use warp::{Filter, Rejection}; | 5 | use warp::{Filter, Rejection}; | 
| 5 | 6 | ||
diff --git a/src/db.rs b/src/db.rs new file mode 100644 index 0000000..bf094ab --- /dev/null +++ b/src/db.rs  | |||
| @@ -0,0 +1,159 @@ | |||
| 1 | //! # Global Database representation | ||
| 2 | //! | ||
| 3 | //! [`Db::blockchain`] is just the last block that was mined. | ||
| 4 | //! All the blocks are written to disk as text files whenever they are accepted. | ||
| 5 | //! | ||
| 6 | //! [`Db::pending_transactions`] is the in memory representation of the waiting transactions. | ||
| 7 | //! Every user can have only one outstanding transaction at any given time. | ||
| 8 | //! | ||
| 9 | //! [`Db::users`] is the in memory representation of the users, | ||
| 10 | //! with their public keys, `metu_ids` and gradecoin balances. | ||
| 11 | use crate::block::{Block, Fingerprint, Id, Transaction}; | ||
| 12 | use crate::student::{MetuId, User, UserAtRest}; | ||
| 13 | use log::debug; | ||
| 14 | use parking_lot::RwLock; | ||
| 15 | use std::{collections::HashMap, fs, io, path::PathBuf, sync::Arc}; | ||
| 16 | |||
| 17 | #[derive(Debug, Clone, Default)] | ||
| 18 | pub struct Db { | ||
| 19 | pub blockchain: Arc<RwLock<Block>>, | ||
| 20 | pub pending_transactions: Arc<RwLock<HashMap<Id, Transaction>>>, | ||
| 21 | pub users: Arc<RwLock<HashMap<Fingerprint, User>>>, | ||
| 22 | // TODO: metu_ids or approved_users or something, metu_id struct <11-04-22, yigit> // | ||
| 23 | } | ||
| 24 | |||
| 25 | impl Db { | ||
| 26 | pub fn new() -> Self { | ||
| 27 | fs::create_dir_all("blocks").unwrap(); | ||
| 28 | fs::create_dir_all("users").unwrap(); | ||
| 29 | let mut db = Db::default(); | ||
| 30 | if let Some(block_path) = last_block_content() { | ||
| 31 | db.populate_with_last_block(block_path); | ||
| 32 | } | ||
| 33 | |||
| 34 | if let Ok(users_path) = read_users() { | ||
| 35 | db.populate_with_users(users_path); | ||
| 36 | } | ||
| 37 | |||
| 38 | let users: HashMap<Fingerprint, User> = get_friendly_users(); | ||
| 39 | |||
| 40 | Db { | ||
| 41 | blockchain: Arc::new(RwLock::new(Block::default())), | ||
| 42 | pending_transactions: Arc::new(RwLock::new(HashMap::new())), | ||
| 43 | users: Arc::new(RwLock::new(users)), | ||
| 44 | } | ||
| 45 | } | ||
| 46 | |||
| 47 | fn populate_with_last_block(&mut self, path: String) { | ||
| 48 | debug!("Populating db with the latest block {}", path); | ||
| 49 | let file = fs::read(path).unwrap(); | ||
| 50 | let json = std::str::from_utf8(&file).unwrap(); | ||
| 51 | let block: Block = serde_json::from_str(json).unwrap(); | ||
| 52 | *self.blockchain.write() = block; | ||
| 53 | } | ||
| 54 | |||
| 55 | fn populate_with_users(&mut self, files: Vec<PathBuf>) { | ||
| 56 | for fs in files { | ||
| 57 | if let Ok(file_content) = fs::read(fs) { | ||
| 58 | let json = | ||
| 59 | String::from_utf8(file_content).expect("we have written a malformed user file"); | ||
| 60 | let user_at_rest: UserAtRest = serde_json::from_str(&json).unwrap(); | ||
| 61 | |||
| 62 | debug!("Populating db with user: {:?}", user_at_rest); | ||
| 63 | self.users | ||
| 64 | .write() | ||
| 65 | .insert(user_at_rest.fingerprint, user_at_rest.user); | ||
| 66 | } | ||
| 67 | } | ||
| 68 | } | ||
| 69 | } | ||
| 70 | |||
| 71 | fn last_block_content() -> Option<String> { | ||
| 72 | let blocks = read_block_name().unwrap(); | ||
| 73 | |||
| 74 | if blocks.is_empty() { | ||
| 75 | return None; | ||
| 76 | } | ||
| 77 | |||
| 78 | let last_block = blocks[0].to_str().unwrap(); | ||
| 79 | let mut last_block = parse_block(last_block); | ||
| 80 | let mut last_block_index = 0; | ||
| 81 | |||
| 82 | for (index, block) in blocks.iter().enumerate() { | ||
| 83 | let block = block.to_str().unwrap(); | ||
| 84 | let block = parse_block(block); | ||
| 85 | if block > last_block { | ||
| 86 | last_block = block; | ||
| 87 | last_block_index = index; | ||
| 88 | } | ||
| 89 | } | ||
| 90 | return Some(blocks[last_block_index].to_str().unwrap().parse().unwrap()); | ||
| 91 | } | ||
| 92 | |||
| 93 | fn read_block_name() -> io::Result<Vec<PathBuf>> { | ||
| 94 | let entries = fs::read_dir("./blocks")? | ||
| 95 | .map(|res| res.map(|e| e.path())) | ||
| 96 | .collect::<Result<Vec<_>, io::Error>>()?; | ||
| 97 | |||
| 98 | Ok(entries) | ||
| 99 | } | ||
| 100 | |||
| 101 | fn parse_block(path: &str) -> u64 { | ||
| 102 | let end_pos = path.find(".block").unwrap(); | ||
| 103 | let block_str = path[9..end_pos].to_string(); | ||
| 104 | let block_u64: u64 = block_str.parse().unwrap(); | ||
| 105 | block_u64 | ||
| 106 | } | ||
| 107 | |||
| 108 | fn read_users() -> io::Result<Vec<PathBuf>> { | ||
| 109 | let entries = fs::read_dir("./users")? | ||
| 110 | .map(|res| res.map(|e| e.path())) | ||
| 111 | .collect::<Result<Vec<_>, io::Error>>()?; | ||
| 112 | |||
| 113 | Ok(entries) | ||
| 114 | } | ||
| 115 | |||
| 116 | fn get_friendly_users() -> HashMap<Fingerprint, User> { | ||
| 117 | let mut users: HashMap<Fingerprint, User> = HashMap::new(); | ||
| 118 | |||
| 119 | users.insert( | ||
| 120 | "cde48537ca2c28084ff560826d0e6388b7c57a51497a6cb56f397289e52ff41b".to_owned(), | ||
| 121 | User { | ||
| 122 | user_id: MetuId::new("friend_1".to_owned(), "not_used".to_owned()).unwrap(), | ||
| 123 | public_key: "not_used".to_owned(), | ||
| 124 | balance: 70, | ||
| 125 | is_bot: true, | ||
| 126 | }, | ||
| 127 | ); | ||
| 128 | |||
| 129 | users.insert( | ||
| 130 | "a1a38b5bae5866d7d998a9834229ec2f9db7a4fc8fb6f58b1115a96a446875ff".to_owned(), | ||
| 131 | User { | ||
| 132 | user_id: MetuId::new("friend_2".to_owned(), "not_used".to_owned()).unwrap(), | ||
| 133 | public_key: "not_used".to_owned(), | ||
| 134 | balance: 20, | ||
| 135 | is_bot: true, | ||
| 136 | }, | ||
| 137 | ); | ||
| 138 | |||
| 139 | users.insert( | ||
| 140 | "4e048fd2a62f1307866086e803e9be43f78a702d5df10831fbf434e7663ae0e7".to_owned(), | ||
| 141 | User { | ||
| 142 | user_id: MetuId::new("friend_4".to_owned(), "not_used".to_owned()).unwrap(), | ||
| 143 | public_key: "not_used".to_owned(), | ||
| 144 | balance: 120, | ||
| 145 | is_bot: true, | ||
| 146 | }, | ||
| 147 | ); | ||
| 148 | |||
| 149 | users.insert( | ||
| 150 | "60e77101e76950a9b1830fa107fd2f8fc545255b3e0f14b6a7797cf9ee005f07".to_owned(), | ||
| 151 | User { | ||
| 152 | user_id: MetuId::new("friend_4".to_owned(), "not_used".to_owned()).unwrap(), | ||
| 153 | public_key: "not_used".to_owned(), | ||
| 154 | balance: 40, | ||
| 155 | is_bot: true, | ||
| 156 | }, | ||
| 157 | ); | ||
| 158 | users | ||
| 159 | } | ||
diff --git a/src/handlers.rs b/src/handlers.rs index 2e9964c..8d8b62f 100644 --- a/src/handlers.rs +++ b/src/handlers.rs  | |||
| @@ -1,24 +1,27 @@ | |||
| 1 | /// API handlers, the ends of each filter chain | 1 | /// API handlers, the ends of each filter chain | 
| 2 | use crate::block::{AuthRequest, Block, Claims, InitialAuthRequest, NakedBlock, Transaction}; | ||
| 3 | use crate::student::{MetuId, User, UserAtRest}; | ||
| 4 | use crate::Db; | ||
| 2 | use aes::Aes128; | 5 | use aes::Aes128; | 
| 3 | use askama::Template; | 6 | use askama::Template; | 
| 4 | use blake2::{Blake2s, Digest}; | 7 | use blake2::{Blake2s, Digest}; | 
| 5 | use block_modes::block_padding::Pkcs7; | 8 | use block_modes::{block_padding::Pkcs7, BlockMode, Cbc}; | 
| 6 | use block_modes::{BlockMode, Cbc}; | ||
| 7 | use chrono::Utc; | 9 | use chrono::Utc; | 
| 8 | use jsonwebtoken::errors::ErrorKind; | 10 | use jsonwebtoken::errors::ErrorKind; | 
| 9 | use jsonwebtoken::{decode, Algorithm, DecodingKey, TokenData, Validation}; | 11 | use jsonwebtoken::{decode, Algorithm, DecodingKey, TokenData, Validation}; | 
| 10 | use lazy_static::lazy_static; | 12 | use lazy_static::lazy_static; | 
| 11 | use log::{debug, warn}; | 13 | use log::{debug, warn}; | 
| 12 | use math; | ||
| 13 | use md5::Md5; | 14 | use md5::Md5; | 
| 14 | use parking_lot::RwLockUpgradableReadGuard; | 15 | use parking_lot::RwLockUpgradableReadGuard; | 
| 15 | use rsa::{PaddingScheme, RSAPrivateKey}; | 16 | use rsa::{PaddingScheme, RSAPrivateKey}; | 
| 16 | use serde::Serialize; | 17 | use serde::Serialize; | 
| 17 | use sha2::Sha256; | 18 | use sha2::Sha256; | 
| 18 | use std::collections::{HashMap, HashSet}; | 19 | use std::{ | 
| 19 | use std::convert::Infallible; | 20 | collections::{HashMap, HashSet}, | 
| 20 | use std::fs; | 21 | convert::Infallible, | 
| 21 | use std::hash::Hash; | 22 | fs, | 
| 23 | hash::Hash, | ||
| 24 | }; | ||
| 22 | use warp::{http::StatusCode, reply}; | 25 | use warp::{http::StatusCode, reply}; | 
| 23 | 26 | ||
| 24 | use crate::PRIVATE_KEY; | 27 | use crate::PRIVATE_KEY; | 
| @@ -52,11 +55,6 @@ enum ResponseType { | |||
| 52 | Error, | 55 | Error, | 
| 53 | } | 56 | } | 
| 54 | 57 | ||
| 55 | use crate::schema::{ | ||
| 56 | AuthRequest, Block, Claims, Db, InitialAuthRequest, MetuId, NakedBlock, Transaction, User, | ||
| 57 | UserAtRest, | ||
| 58 | }; | ||
| 59 | |||
| 60 | const BEARER: &str = "Bearer "; | 58 | const BEARER: &str = "Bearer "; | 
| 61 | 59 | ||
| 62 | lazy_static! { | 60 | lazy_static! { | 
| @@ -64,7 +62,7 @@ lazy_static! { | |||
| 64 | .lines() | 62 | .lines() | 
| 65 | .filter(|line| !line.starts_with('-')) | 63 | .filter(|line| !line.starts_with('-')) | 
| 66 | .fold(String::new(), |mut data, line| { | 64 | .fold(String::new(), |mut data, line| { | 
| 67 | data.push_str(&line); | 65 | data.push_str(line); | 
| 68 | data | 66 | data | 
| 69 | }); | 67 | }); | 
| 70 | 68 | ||
| @@ -87,9 +85,9 @@ lazy_static! { | |||
| 87 | /// - Student picks a short temporary key (`k_temp`) | 85 | /// - Student picks a short temporary key (`k_temp`) | 
| 88 | /// - Creates a JSON object (`auth_plaintext`) with their `metu_id` and `public key` in base64 (PEM) format (`S_PK`): | 86 | /// - Creates a JSON object (`auth_plaintext`) with their `metu_id` and `public key` in base64 (PEM) format (`S_PK`): | 
| 89 | /// { | 87 | /// { | 
| 90 | /// student_id: "e12345", | 88 | /// `student_id`: "e12345", | 
| 91 | /// passwd: "15 char secret" | 89 | /// `passwd`: "15 char secret" | 
| 92 | /// public_key: "---BEGIN PUBLIC KEY..." | 90 | /// `public_key`: "---BEGIN PUBLIC KEY..." | 
| 93 | /// } | 91 | /// } | 
| 94 | /// | 92 | /// | 
| 95 | /// - Encrypts the serialized string of `auth_plaintext` with 128 bit block AES in CBC mode with Pkcs7 padding using the temporary key (`k_temp`), the result is `auth_ciphertext` | 93 | /// - Encrypts the serialized string of `auth_plaintext` with 128 bit block AES in CBC mode with Pkcs7 padding using the temporary key (`k_temp`), the result is `auth_ciphertext` | 
| @@ -97,18 +95,17 @@ lazy_static! { | |||
| 97 | /// using sha256 with `gradecoin_public_key`, giving us `key_ciphertext` | 95 | /// using sha256 with `gradecoin_public_key`, giving us `key_ciphertext` | 
| 98 | /// - The payload JSON object (`auth_request`) can be JSON serialized now: | 96 | /// - The payload JSON object (`auth_request`) can be JSON serialized now: | 
| 99 | /// { | 97 | /// { | 
| 100 | /// c: "auth_ciphertext" | 98 | /// c: "`auth_ciphertext`" | 
| 101 | /// key: "key_ciphertext" | 99 | /// key: "`key_ciphertext`" | 
| 102 | /// } | 100 | /// } | 
| 103 | /// | 101 | /// | 
| 104 | /// ## Gradecoin Side | 102 | /// ## Gradecoin Side | 
| 105 | /// | 103 | /// | 
| 106 | /// - Upon receiving, we first RSA decrypt with OAEP padding scheme using SHA256 with `gradecoin_private_key` as the key and auth_request.key `key` as the ciphertext, receiving `temp_key` (this is the temporary key chosen by student) | 104 | /// - Upon receiving, we first RSA decrypt with OAEP padding scheme using SHA256 with `gradecoin_private_key` as the key and `auth_request.key` `key` as the ciphertext, receiving `temp_key` (this is the temporary key chosen by student) | 
| 107 | /// - With `temp_key`, we can AES 128 Cbc Pkcs7 decrypt the `auth_request.c`, giving us | 105 | /// - With `temp_key`, we can AES 128 Cbc Pkcs7 decrypt the `auth_request.c`, giving us `auth_plaintext` | 
| 108 | /// auth_plaintext | ||
| 109 | /// - The `auth_plaintext` String can be deserialized to [`AuthRequest`] | 106 | /// - The `auth_plaintext` String can be deserialized to [`AuthRequest`] | 
| 110 | /// - We then verify the payload and calculate the User fingerprint | 107 | /// - We then verify the payload and calculate the User fingerprint | 
| 111 | /// - Finally, create the new [`User`] object, insert to users HashMap `<fingerprint, User>` | 108 | /// - Finally, create the new [`User`] object, insert to users `HashMap` `<fingerprint, User>` | 
| 112 | /// | 109 | /// | 
| 113 | pub async fn authenticate_user( | 110 | pub async fn authenticate_user( | 
| 114 | request: InitialAuthRequest, | 111 | request: InitialAuthRequest, | 
| @@ -226,7 +223,7 @@ pub async fn authenticate_user( | |||
| 226 | 223 | ||
| 227 | // c field was properly base64 encoded, now available in auth_packet | 224 | // c field was properly base64 encoded, now available in auth_packet | 
| 228 | // decryptor was setup properly, with the correct lenght key | 225 | // decryptor was setup properly, with the correct lenght key | 
| 229 | let mut buf = auth_packet.to_vec(); | 226 | let mut buf = auth_packet; | 
| 230 | let auth_plaintext = match cipher.decrypt(&mut buf) { | 227 | let auth_plaintext = match cipher.decrypt(&mut buf) { | 
| 231 | Ok(p) => p, | 228 | Ok(p) => p, | 
| 232 | Err(err) => { | 229 | Err(err) => { | 
| @@ -284,22 +281,21 @@ pub async fn authenticate_user( | |||
| 284 | 281 | ||
| 285 | // is the student in AuthRequest privileged? | 282 | // is the student in AuthRequest privileged? | 
| 286 | let privileged_student_id = | 283 | let privileged_student_id = | 
| 287 | match MetuId::new(request.student_id.clone(), request.passwd.clone()) { | 284 | if let Some(id) = MetuId::new(request.student_id.clone(), request.passwd.clone()) { | 
| 288 | Some(id) => id, | 285 | id | 
| 289 | None => { | 286 | } else { | 
| 290 | debug!( | 287 | debug!( | 
| 291 | "Someone tried to auth with invalid credentials: {} {}", | 288 | "Someone tried to auth with invalid credentials: {} {}", | 
| 292 | &request.student_id, &request.passwd | 289 | &request.student_id, &request.passwd | 
| 293 | ); | 290 | ); | 
| 294 | let res_json = warp::reply::json(&GradeCoinResponse { | 291 | let res_json = warp::reply::json(&GradeCoinResponse { | 
| 295 | res: ResponseType::Error, | 292 | res: ResponseType::Error, | 
| 296 | message: | 293 | message: | 
| 297 | "The credentials given ('student_id', 'passwd') cannot hold a Gradecoin account" | 294 | "The credentials given ('student_id', 'passwd') cannot hold a Gradecoin account" | 
| 298 | .to_owned(), | 295 | .to_owned(), | 
| 299 | }); | 296 | }); | 
| 300 | 297 | ||
| 301 | return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); | 298 | return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); | 
| 302 | } | ||
| 303 | }; | 299 | }; | 
| 304 | 300 | ||
| 305 | // Students should be able to authenticate once | 301 | // Students should be able to authenticate once | 
| @@ -329,7 +325,7 @@ pub async fn authenticate_user( | |||
| 329 | return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); | 325 | return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); | 
| 330 | } | 326 | } | 
| 331 | 327 | ||
| 332 | let fingerprint = format!("{:x}", Sha256::digest(&request.public_key.as_bytes())); | 328 | let fingerprint = format!("{:x}", Sha256::digest(request.public_key.as_bytes())); | 
| 333 | 329 | ||
| 334 | let new_user = User { | 330 | let new_user = User { | 
| 335 | user_id: privileged_student_id, | 331 | user_id: privileged_student_id, | 
| @@ -387,7 +383,7 @@ pub async fn list_transactions(db: Db) -> Result<impl warp::Reply, Infallible> { | |||
| 387 | /// Proposes a new block for the next round. | 383 | /// Proposes a new block for the next round. | 
| 388 | /// Can reject the block | 384 | /// Can reject the block | 
| 389 | /// | 385 | /// | 
| 390 | /// The proposer has to put their transaction as the first transaction of the [`transaction_list`]. | 386 | /// The proposer has to put their transaction as the first transaction of the transaction_list. | 
| 391 | /// This is the analogue of `coinbase` in Bitcoin works | 387 | /// This is the analogue of `coinbase` in Bitcoin works | 
| 392 | /// | 388 | /// | 
| 393 | /// The `coinbase` transaction also gets something for their efforts. | 389 | /// The `coinbase` transaction also gets something for their efforts. | 
| @@ -420,9 +416,10 @@ pub async fn propose_block( | |||
| 420 | let pending_transactions = db.pending_transactions.upgradable_read(); | 416 | let pending_transactions = db.pending_transactions.upgradable_read(); | 
| 421 | 417 | ||
| 422 | // we get the proposers fingerprint by finding the transaction (id) then extracting the source | 418 | // we get the proposers fingerprint by finding the transaction (id) then extracting the source | 
| 423 | let internal_user_fingerprint = match pending_transactions.get(&new_block.transaction_list[0]) { | 419 | let internal_user_fingerprint = | 
| 424 | Some(coinbase) => &coinbase.source, | 420 | if let Some(coinbase) = pending_transactions.get(&new_block.transaction_list[0]) { | 
| 425 | None => { | 421 | &coinbase.source | 
| 422 | } else { | ||
| 426 | debug!( | 423 | debug!( | 
| 427 | "Transaction with id {} is not found in the pending_transactions", | 424 | "Transaction with id {} is not found in the pending_transactions", | 
| 428 | new_block.transaction_list[0] | 425 | new_block.transaction_list[0] | 
| @@ -434,34 +431,31 @@ pub async fn propose_block( | |||
| 434 | }); | 431 | }); | 
| 435 | 432 | ||
| 436 | return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); | 433 | return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); | 
| 437 | } | 434 | }; | 
| 438 | }; | ||
| 439 | 435 | ||
| 440 | let users_store = db.users.upgradable_read(); | 436 | let users_store = db.users.upgradable_read(); | 
| 441 | 437 | ||
| 442 | // this probably cannot fail, if the transaction is valid then it must've been checked already | 438 | // this probably cannot fail, if the transaction is valid then it must've been checked already | 
| 443 | let internal_user = match users_store.get(internal_user_fingerprint) { | 439 | let internal_user = if let Some(existing_user) = users_store.get(internal_user_fingerprint) { | 
| 444 | Some(existing_user) => existing_user, | 440 | existing_user | 
| 445 | None => { | 441 | } else { | 
| 446 | debug!( | 442 | debug!( | 
| 447 | "User with public key signature {:?} is not found in the database", | 443 | "User with public key signature {:?} is not found in the database", | 
| 448 | new_block.transaction_list[0] | 444 | new_block.transaction_list[0] | 
| 449 | ); | 445 | ); | 
| 450 | 446 | ||
| 451 | let res_json = warp::reply::json(&GradeCoinResponse { | 447 | let res_json = warp::reply::json(&GradeCoinResponse { | 
| 452 | res: ResponseType::Error, | 448 | res: ResponseType::Error, | 
| 453 | message: "User with that public key signature is not found in the database" | 449 | message: "User with that public key signature is not found in the database".to_owned(), | 
| 454 | .to_owned(), | 450 | }); | 
| 455 | }); | ||
| 456 | 451 | ||
| 457 | return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); | 452 | return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); | 
| 458 | } | ||
| 459 | }; | 453 | }; | 
| 460 | 454 | ||
| 461 | let proposer_public_key = &internal_user.public_key; | 455 | let proposer_public_key = &internal_user.public_key; | 
| 462 | 456 | ||
| 463 | // JWT Check | 457 | // JWT Check | 
| 464 | let token_payload = match authorize_proposer(token, &proposer_public_key) { | 458 | let token_payload = match authorize_proposer(&token, proposer_public_key) { | 
| 465 | Ok(data) => data, | 459 | Ok(data) => data, | 
| 466 | Err(below) => { | 460 | Err(below) => { | 
| 467 | debug!("Something went wrong with the JWT {:?}", below); | 461 | debug!("Something went wrong with the JWT {:?}", below); | 
| @@ -501,7 +495,7 @@ pub async fn propose_block( | |||
| 501 | } | 495 | } | 
| 502 | 496 | ||
| 503 | // Are transactions in the block valid? | 497 | // Are transactions in the block valid? | 
| 504 | for transaction_hash in new_block.transaction_list.iter() { | 498 | for transaction_hash in &new_block.transaction_list { | 
| 505 | if !pending_transactions.contains_key(transaction_hash) { | 499 | if !pending_transactions.contains_key(transaction_hash) { | 
| 506 | let res_json = warp::reply::json(&GradeCoinResponse { | 500 | let res_json = warp::reply::json(&GradeCoinResponse { | 
| 507 | res: ResponseType::Error, | 501 | res: ResponseType::Error, | 
| @@ -536,7 +530,7 @@ pub async fn propose_block( | |||
| 536 | } | 530 | } | 
| 537 | 531 | ||
| 538 | // Are the 6 leftmost characters (=24 bits) zero? | 532 | // Are the 6 leftmost characters (=24 bits) zero? | 
| 539 | let should_zero = hashvalue[0] as i32 + hashvalue[1] as i32 + hashvalue[2] as i32; | 533 | let should_zero = i32::from(hashvalue[0]) + i32::from(hashvalue[1]) + i32::from(hashvalue[2]); | 
| 540 | 534 | ||
| 541 | if should_zero != 0 { | 535 | if should_zero != 0 { | 
| 542 | debug!("the hash does not have 6 rightmost zero bits"); | 536 | debug!("the hash does not have 6 rightmost zero bits"); | 
| @@ -566,7 +560,7 @@ pub async fn propose_block( | |||
| 566 | let holding: HashMap<String, Transaction> = HashMap::new(); | 560 | let holding: HashMap<String, Transaction> = HashMap::new(); | 
| 567 | 561 | ||
| 568 | // Play out the transactions | 562 | // Play out the transactions | 
| 569 | for fingerprint in new_block.transaction_list.iter() { | 563 | for fingerprint in &new_block.transaction_list { | 
| 570 | if let Some(transaction) = pending_transactions.remove(fingerprint) { | 564 | if let Some(transaction) = pending_transactions.remove(fingerprint) { | 
| 571 | let source = &transaction.source; | 565 | let source = &transaction.source; | 
| 572 | let target = &transaction.target; | 566 | let target = &transaction.target; | 
| @@ -581,7 +575,7 @@ pub async fn propose_block( | |||
| 581 | if is_source_bot { | 575 | if is_source_bot { | 
| 582 | // Add staking reward | 576 | // Add staking reward | 
| 583 | to.balance += | 577 | to.balance += | 
| 584 | math::round::ceil((transaction.amount as f64) * STAKING_REWARD, 0) | 578 | math::round::ceil((f64::from(transaction.amount)) * STAKING_REWARD, 0) | 
| 585 | as u16; | 579 | as u16; | 
| 586 | } | 580 | } | 
| 587 | } | 581 | } | 
| @@ -592,8 +586,8 @@ pub async fn propose_block( | |||
| 592 | pending_transactions.insert( | 586 | pending_transactions.insert( | 
| 593 | transaction_id, | 587 | transaction_id, | 
| 594 | Transaction { | 588 | Transaction { | 
| 595 | source: target.to_owned(), | 589 | source: target.clone(), | 
| 596 | target: source.to_owned(), | 590 | target: source.clone(), | 
| 597 | amount: transaction.amount, | 591 | amount: transaction.amount, | 
| 598 | timestamp: Utc::now().naive_local(), | 592 | timestamp: Utc::now().naive_local(), | 
| 599 | }, | 593 | }, | 
| @@ -602,8 +596,8 @@ pub async fn propose_block( | |||
| 602 | } | 596 | } | 
| 603 | } | 597 | } | 
| 604 | 598 | ||
| 605 | for (fp, tx) in holding.iter() { | 599 | for (fp, tx) in &holding { | 
| 606 | pending_transactions.insert(fp.to_owned(), tx.to_owned()); | 600 | pending_transactions.insert(fp.clone(), tx.clone()); | 
| 607 | } | 601 | } | 
| 608 | 602 | ||
| 609 | // just update everyone's .guy file | 603 | // just update everyone's .guy file | 
| @@ -665,23 +659,21 @@ pub async fn propose_transaction( | |||
| 665 | let users_store = db.users.read(); | 659 | let users_store = db.users.read(); | 
| 666 | 660 | ||
| 667 | // Is this transaction from an authorized source? | 661 | // Is this transaction from an authorized source? | 
| 668 | let internal_user = match users_store.get(&new_transaction.source) { | 662 | let internal_user = if let Some(existing_user) = users_store.get(&new_transaction.source) { | 
| 669 | Some(existing_user) => existing_user, | 663 | existing_user | 
| 670 | None => { | 664 | } else { | 
| 671 | debug!( | 665 | debug!( | 
| 672 | "User with public key signature {:?} is not found in the database", | 666 | "User with public key signature {:?} is not found in the database", | 
| 673 | new_transaction.source | 667 | new_transaction.source | 
| 674 | ); | 668 | ); | 
| 675 | 669 | ||
| 676 | return Ok(warp::reply::with_status( | 670 | return Ok(warp::reply::with_status( | 
| 677 | warp::reply::json(&GradeCoinResponse { | 671 | warp::reply::json(&GradeCoinResponse { | 
| 678 | res: ResponseType::Error, | 672 | res: ResponseType::Error, | 
| 679 | message: "User with the given public key signature is not authorized" | 673 | message: "User with the given public key signature is not authorized".to_owned(), | 
| 680 | .to_owned(), | 674 | }), | 
| 681 | }), | 675 | StatusCode::BAD_REQUEST, | 
| 682 | StatusCode::BAD_REQUEST, | 676 | )); | 
| 683 | )); | ||
| 684 | } | ||
| 685 | }; | 677 | }; | 
| 686 | 678 | ||
| 687 | if internal_user.is_bot { | 679 | if internal_user.is_bot { | 
| @@ -702,7 +694,7 @@ pub async fn propose_transaction( | |||
| 702 | // *this* point | 694 | // *this* point | 
| 703 | let proposer_public_key = &internal_user.public_key; | 695 | let proposer_public_key = &internal_user.public_key; | 
| 704 | 696 | ||
| 705 | let token_payload = match authorize_proposer(token, &proposer_public_key) { | 697 | let token_payload = match authorize_proposer(&token, proposer_public_key) { | 
| 706 | Ok(data) => data, | 698 | Ok(data) => data, | 
| 707 | Err(below) => { | 699 | Err(below) => { | 
| 708 | debug!("JWT Error: {:?}", below); | 700 | debug!("JWT Error: {:?}", below); | 
| @@ -815,7 +807,7 @@ pub async fn propose_transaction( | |||
| 815 | 807 | ||
| 816 | debug!("Taking the hash of {}", serd_tx); | 808 | debug!("Taking the hash of {}", serd_tx); | 
| 817 | 809 | ||
| 818 | let hashed_transaction = Md5::digest(&serd_tx.as_bytes()); | 810 | let hashed_transaction = Md5::digest(serd_tx.as_bytes()); | 
| 819 | if token_payload.claims.tha != format!("{:x}", hashed_transaction) { | 811 | if token_payload.claims.tha != format!("{:x}", hashed_transaction) { | 
| 820 | return Ok(warp::reply::with_status( | 812 | return Ok(warp::reply::with_status( | 
| 821 | warp::reply::json(&GradeCoinResponse { | 813 | warp::reply::json(&GradeCoinResponse { | 
| @@ -859,7 +851,7 @@ pub async fn list_blocks(db: Db) -> Result<impl warp::Reply, Infallible> { | |||
| 859 | /// *[`jwt_token`]: The raw JWT token, "Bearer aaa.bbb.ccc" | 851 | /// *[`jwt_token`]: The raw JWT token, "Bearer aaa.bbb.ccc" | 
| 860 | /// *[`user_pem`]: User Public Key, "BEGIN RSA" | 852 | /// *[`user_pem`]: User Public Key, "BEGIN RSA" | 
| 861 | /// NOT async, might look into it if this becomes a bottleneck | 853 | /// NOT async, might look into it if this becomes a bottleneck | 
| 862 | fn authorize_proposer(jwt_token: String, user_pem: &str) -> Result<TokenData<Claims>, String> { | 854 | fn authorize_proposer(jwt_token: &str, user_pem: &str) -> Result<TokenData<Claims>, String> { | 
| 863 | // Throw away the "Bearer " part | 855 | // Throw away the "Bearer " part | 
| 864 | let raw_jwt = jwt_token.trim_start_matches(BEARER).to_owned(); | 856 | let raw_jwt = jwt_token.trim_start_matches(BEARER).to_owned(); | 
| 865 | 857 | ||
| @@ -929,7 +921,7 @@ pub async fn user_list_handler(db: Db) -> Result<impl warp::Reply, warp::Rejecti | |||
| 929 | 921 | ||
| 930 | for (fingerprint, user) in users.iter() { | 922 | for (fingerprint, user) in users.iter() { | 
| 931 | sane_users.push(DisplayUsers { | 923 | sane_users.push(DisplayUsers { | 
| 932 | fingerprint: fingerprint.to_owned(), | 924 | fingerprint: fingerprint.clone(), | 
| 933 | balance: user.balance, | 925 | balance: user.balance, | 
| 934 | is_bot: user.is_bot, | 926 | is_bot: user.is_bot, | 
| 935 | }); | 927 | }); | 
diff --git a/src/lib.rs b/src/lib.rs deleted file mode 100644 index c335ae9..0000000 --- a/src/lib.rs +++ /dev/null  | |||
| @@ -1,35 +0,0 @@ | |||
| 1 | //! # Gradecoin | ||
| 2 | //! | ||
| 3 | //! ## Services | ||
| 4 | //! ### /register | ||
| 5 | //! - Student creates their own 2048 bit RSA `keypair` | ||
| 6 | //! - Downloads `Gradecoin`'s Public Key from Moodle | ||
| 7 | //! - Encrypts their JSON wrapped `Public Key` and `Student ID` using Gradecoin's Public Key | ||
| 8 | //! - Their public key is now in our Db under [`schema::User::public_key`] and can be used to sign their JWT's during requests | ||
| 9 | //! | ||
| 10 | //! ### /transaction | ||
| 11 | //! - offer a [`schema::Transaction`] - POST request | ||
| 12 | //! - The request should have `Authorization` | ||
| 13 | //! - The request header should be signed by the Public Key of the `by` field in the transaction | ||
| 14 | //! - fetch the list of `Transaction`s - GET request | ||
| 15 | //! | ||
| 16 | //! ### /block | ||
| 17 | //! - offer a [`schema::Block`] - POST request | ||
| 18 | //! - The request should have `Authorization` | ||
| 19 | //! - The [`schema::Block::transaction_list`] of the block should be a subset of [`schema::Db::pending_transactions`] | ||
| 20 | //! - fetch the last accepted [`schema::Block`] - GET request | ||
| 21 | //! | ||
| 22 | //! `Authorization`: The request header should have Bearer JWT.Token signed with Student Public Key | ||
| 23 | |||
| 24 | pub mod custom_filters; | ||
| 25 | pub mod handlers; | ||
| 26 | pub mod routes; | ||
| 27 | pub mod schema; | ||
| 28 | |||
| 29 | use lazy_static::lazy_static; | ||
| 30 | use std::fs; | ||
| 31 | |||
| 32 | lazy_static! { | ||
| 33 | static ref PRIVATE_KEY: String = | ||
| 34 | fs::read_to_string("secrets/gradecoin.pem").expect("error reading 'secrets/gradecoin.pem'"); | ||
| 35 | } | ||
diff --git a/src/main.rs b/src/main.rs new file mode 100644 index 0000000..f0027f2 --- /dev/null +++ b/src/main.rs  | |||
| @@ -0,0 +1,52 @@ | |||
| 1 | //! # Gradecoin | ||
| 2 | //! | ||
| 3 | //! ## Services | ||
| 4 | //! ### /register | ||
| 5 | //! - Student creates their own 2048 bit RSA `keypair` | ||
| 6 | //! - Downloads `Gradecoin`'s Public Key from Moodle | ||
| 7 | //! - Encrypts their JSON wrapped `Public Key` and `Student ID` using Gradecoin's Public Key | ||
| 8 | //! - Their public key is now in our Db under [`block::User::public_key`] and can be used to sign their JWT's during requests | ||
| 9 | //! | ||
| 10 | //! ### /transaction | ||
| 11 | //! - offer a [`block::Transaction`] - POST request | ||
| 12 | //! - The request should have `Authorization` | ||
| 13 | //! - The request header should be signed by the Public Key of the `by` field in the transaction | ||
| 14 | //! - fetch the list of `Transaction`s - GET request | ||
| 15 | //! | ||
| 16 | //! ### /block | ||
| 17 | //! - offer a [`block::Block`] - POST request | ||
| 18 | //! - The request should have `Authorization` | ||
| 19 | //! - The [`block::Block::transaction_list`] of the block should be a subset of [`block::Db::pending_transactions`] | ||
| 20 | //! - fetch the last accepted [`block::Block`] - GET request | ||
| 21 | //! | ||
| 22 | //! `Authorization`: The request header should have Bearer JWT.Token signed with Student Public Key | ||
| 23 | #![warn(clippy::all, clippy::pedantic)] | ||
| 24 | #![allow(clippy::unused_async)] | ||
| 25 | |||
| 26 | mod custom_filters; | ||
| 27 | mod db; | ||
| 28 | mod handlers; | ||
| 29 | mod routes; | ||
| 30 | mod block; | ||
| 31 | mod student; | ||
| 32 | |||
| 33 | pub use block::{Fingerprint, Id}; | ||
| 34 | use db::Db; | ||
| 35 | use lazy_static::lazy_static; | ||
| 36 | use std::fs; | ||
| 37 | |||
| 38 | #[tokio::main] | ||
| 39 | async fn main() { | ||
| 40 | log4rs::init_file("log.conf.yml", log4rs::config::Deserializers::default()).unwrap(); | ||
| 41 | |||
| 42 | let api = routes::application(Db::new()); | ||
| 43 | |||
| 44 | // Start the server | ||
| 45 | let point = ([127, 0, 0, 1], 8080); | ||
| 46 | warp::serve(api).run(point).await; | ||
| 47 | } | ||
| 48 | |||
| 49 | lazy_static! { | ||
| 50 | static ref PRIVATE_KEY: String = | ||
| 51 | fs::read_to_string("secrets/gradecoin.pem").expect("error reading 'secrets/gradecoin.pem'"); | ||
| 52 | } | ||
diff --git a/src/routes.rs b/src/routes.rs index f39e98a..e3322ad 100644 --- a/src/routes.rs +++ b/src/routes.rs  | |||
| @@ -1,12 +1,12 @@ | |||
| 1 | /// Endpoints and their construction | 1 | //! # Endpoints and their construction | 
| 2 | // | ||
| 2 | use warp::{Filter, Rejection, Reply}; | 3 | use warp::{Filter, Rejection, Reply}; | 
| 3 | |||
| 4 | use crate::custom_filters; | 4 | use crate::custom_filters; | 
| 5 | use crate::handlers; | 5 | use crate::handlers; | 
| 6 | use crate::schema::Db; | 6 | use crate::Db; | 
| 7 | 7 | ||
| 8 | /// Every route combined | 8 | /// Every route combined | 
| 9 | pub fn consensus_routes(db: Db) -> impl Filter<Extract = impl Reply, Error = Rejection> + Clone { | 9 | pub fn application(db: Db) -> impl Filter<Extract = impl Reply, Error = Rejection> + Clone { | 
| 10 | // Remember when we wanted to implement templating | 10 | // Remember when we wanted to implement templating | 
| 11 | // Why would we? Just put a staic webpage under /public (next to Cargo.toml) and place it and | 11 | // Why would we? Just put a staic webpage under /public (next to Cargo.toml) and place it and | 
| 12 | // the end of the filter chain | 12 | // the end of the filter chain | 
diff --git a/src/schema.rs b/src/schema.rs deleted file mode 100644 index bbd4628..0000000 --- a/src/schema.rs +++ /dev/null  | |||
| @@ -1,377 +0,0 @@ | |||
| 1 | //! # Data Representations | ||
| 2 | //! | ||
| 3 | //! We need persistence for [`Block`]s and [`User`]s, not so much for [`Transaction`]s | ||
| 4 | //! | ||
| 5 | //! There are around 30 students, a full fledged database would be an overkill (for next year?) | ||
| 6 | //! | ||
| 7 | //! Pending transactions are held in memory, these are cleared with every new block | ||
| 8 | //! Only the last block is held in memory, every block is written to a file | ||
| 9 | //! Users are held in memory and they're also backed up to text files | ||
| 10 | use chrono::{NaiveDate, NaiveDateTime}; | ||
| 11 | use lazy_static::lazy_static; | ||
| 12 | use log::debug; | ||
| 13 | use parking_lot::RwLock; | ||
| 14 | use serde::{Deserialize, Serialize}; | ||
| 15 | use std::collections::{HashMap, HashSet}; | ||
| 16 | use std::fmt; | ||
| 17 | use std::fs; | ||
| 18 | use std::io; | ||
| 19 | use std::path::PathBuf; | ||
| 20 | use std::string::String; | ||
| 21 | use std::sync::Arc; | ||
| 22 | use std::vec::Vec; | ||
| 23 | |||
| 24 | pub type Fingerprint = String; | ||
| 25 | pub type Id = String; | ||
| 26 | |||
| 27 | fn block_parser(path: String) -> u64 { | ||
| 28 | let end_pos = path.find(".block").unwrap(); | ||
| 29 | let block_str = path[9..end_pos].to_string(); | ||
| 30 | let block_u64: u64 = block_str.parse().unwrap(); | ||
| 31 | block_u64 | ||
| 32 | } | ||
| 33 | |||
| 34 | fn last_block_content() -> Option<String> { | ||
| 35 | let blocks = read_block_name().unwrap(); | ||
| 36 | |||
| 37 | if blocks.is_empty() { | ||
| 38 | return None; | ||
| 39 | } | ||
| 40 | |||
| 41 | let last_block = blocks[0].to_str().unwrap(); | ||
| 42 | let mut last_block = block_parser(last_block.to_string()); | ||
| 43 | let mut last_block_index = 0; | ||
| 44 | |||
| 45 | for (index, block) in blocks.iter().enumerate() { | ||
| 46 | let block = block.to_str().unwrap(); | ||
| 47 | let block = block_parser(block.to_string()); | ||
| 48 | if block > last_block { | ||
| 49 | last_block = block; | ||
| 50 | last_block_index = index; | ||
| 51 | } | ||
| 52 | } | ||
| 53 | return Some(blocks[last_block_index].to_str().unwrap().parse().unwrap()); | ||
| 54 | } | ||
| 55 | |||
| 56 | fn read_block_name() -> io::Result<Vec<PathBuf>> { | ||
| 57 | let entries = fs::read_dir("./blocks")? | ||
| 58 | .map(|res| res.map(|e| e.path())) | ||
| 59 | .collect::<Result<Vec<_>, io::Error>>()?; | ||
| 60 | |||
| 61 | Ok(entries) | ||
| 62 | } | ||
| 63 | |||
| 64 | fn read_users() -> io::Result<Vec<PathBuf>> { | ||
| 65 | let entries = fs::read_dir("./users")? | ||
| 66 | .map(|res| res.map(|e| e.path())) | ||
| 67 | .collect::<Result<Vec<_>, io::Error>>()?; | ||
| 68 | |||
| 69 | Ok(entries) | ||
| 70 | } | ||
| 71 | |||
| 72 | fn populate_db_with_last_block(db: &mut Db, path: String) -> &mut Db { | ||
| 73 | debug!("Populating db with last block {}", path); | ||
| 74 | let file = fs::read(path).unwrap(); | ||
| 75 | let json = std::str::from_utf8(&file).unwrap(); | ||
| 76 | let block: Block = serde_json::from_str(json).unwrap(); | ||
| 77 | *db.blockchain.write() = block; | ||
| 78 | |||
| 79 | db | ||
| 80 | } | ||
| 81 | |||
| 82 | #[derive(Debug, Serialize, Deserialize, PartialEq)] | ||
| 83 | pub struct UserAtRest { | ||
| 84 | pub fingerprint: Fingerprint, | ||
| 85 | pub user: User, | ||
| 86 | } | ||
| 87 | |||
| 88 | fn populate_db_with_users(db: &mut Db, files: Vec<PathBuf>) -> &mut Db { | ||
| 89 | for fs in files { | ||
| 90 | if let Ok(file_content) = fs::read(fs) { | ||
| 91 | let json = | ||
| 92 | String::from_utf8(file_content).expect("we have written a malformed user file"); | ||
| 93 | let user_at_rest: UserAtRest = serde_json::from_str(&json).unwrap(); | ||
| 94 | |||
| 95 | debug!("Populating db with user: {:?}", user_at_rest); | ||
| 96 | db.users | ||
| 97 | .write() | ||
| 98 | .insert(user_at_rest.fingerprint, user_at_rest.user); | ||
| 99 | } | ||
| 100 | } | ||
| 101 | |||
| 102 | db | ||
| 103 | } | ||
| 104 | |||
| 105 | /// Creates a new database, uses the previous last block if one exists and attempts the populate | ||
| 106 | /// the users | ||
| 107 | pub fn create_database() -> Db { | ||
| 108 | fs::create_dir_all("blocks").unwrap(); | ||
| 109 | fs::create_dir_all("users").unwrap(); | ||
| 110 | let mut db = Db::new(); | ||
| 111 | if let Some(block_path) = last_block_content() { | ||
| 112 | populate_db_with_last_block(&mut db, block_path); | ||
| 113 | } | ||
| 114 | |||
| 115 | if let Ok(users_path) = read_users() { | ||
| 116 | populate_db_with_users(&mut db, users_path); | ||
| 117 | } | ||
| 118 | |||
| 119 | db | ||
| 120 | } | ||
| 121 | |||
| 122 | /// A JWT Payload/Claims representation | ||
| 123 | /// | ||
| 124 | /// https://tools.ietf.org/html/rfc7519#section-4.1 | ||
| 125 | /// | ||
| 126 | /// - `tha`: Transaction Hash, String (custom field) | ||
| 127 | /// - `iat`: Issued At, Unix Time, epoch | ||
| 128 | /// - `exp`: Expiration Time, epoch | ||
| 129 | #[derive(Debug, Serialize, Deserialize, PartialEq)] | ||
| 130 | pub struct Claims { | ||
| 131 | pub tha: String, | ||
| 132 | pub iat: usize, | ||
| 133 | pub exp: usize, | ||
| 134 | } | ||
| 135 | |||
| 136 | /// Global Database representation | ||
| 137 | /// | ||
| 138 | /// [`Db::blockchain`] is just the last block that was mined. All the blocks are written to disk as text | ||
| 139 | /// files whenever they are accepted. | ||
| 140 | /// | ||
| 141 | /// [`Db::pending_transactions`] is the in memory representation of the waiting transactions. Every | ||
| 142 | /// user can have only one outstanding transaction at any given time. | ||
| 143 | /// | ||
| 144 | /// [`Db::users`] is the in memory representation of the users, with their public keys, metu_ids and | ||
| 145 | /// gradecoin balances. | ||
| 146 | #[derive(Debug, Clone)] | ||
| 147 | pub struct Db { | ||
| 148 | pub blockchain: Arc<RwLock<Block>>, | ||
| 149 | pub pending_transactions: Arc<RwLock<HashMap<Id, Transaction>>>, | ||
| 150 | pub users: Arc<RwLock<HashMap<Fingerprint, User>>>, | ||
| 151 | } | ||
| 152 | |||
| 153 | impl Db { | ||
| 154 | pub fn new() -> Self { | ||
| 155 | let mut users: HashMap<Fingerprint, User> = HashMap::new(); | ||
| 156 | |||
| 157 | let friendly_1 = MetuId::new("friend_1".to_owned(), "not_used".to_owned()).unwrap(); | ||
| 158 | |||
| 159 | users.insert( | ||
| 160 | "cde48537ca2c28084ff560826d0e6388b7c57a51497a6cb56f397289e52ff41b".to_owned(), | ||
| 161 | User { | ||
| 162 | user_id: friendly_1, | ||
| 163 | public_key: "not_used".to_owned(), | ||
| 164 | balance: 70, | ||
| 165 | is_bot: true, | ||
| 166 | }, | ||
| 167 | ); | ||
| 168 | |||
| 169 | let friendly_2 = MetuId::new("friend_2".to_owned(), "not_used".to_owned()).unwrap(); | ||
| 170 | |||
| 171 | users.insert( | ||
| 172 | "a1a38b5bae5866d7d998a9834229ec2f9db7a4fc8fb6f58b1115a96a446875ff".to_owned(), | ||
| 173 | User { | ||
| 174 | user_id: friendly_2, | ||
| 175 | public_key: "not_used".to_owned(), | ||
| 176 | balance: 20, | ||
| 177 | is_bot: true, | ||
| 178 | }, | ||
| 179 | ); | ||
| 180 | |||
| 181 | let friendly_3 = MetuId::new("friend_4".to_owned(), "not_used".to_owned()).unwrap(); | ||
| 182 | |||
| 183 | users.insert( | ||
| 184 | "4e048fd2a62f1307866086e803e9be43f78a702d5df10831fbf434e7663ae0e7".to_owned(), | ||
| 185 | User { | ||
| 186 | user_id: friendly_3, | ||
| 187 | public_key: "not_used".to_owned(), | ||
| 188 | balance: 120, | ||
| 189 | is_bot: true, | ||
| 190 | }, | ||
| 191 | ); | ||
| 192 | |||
| 193 | let friendly_4 = MetuId::new("friend_4".to_owned(), "not_used".to_owned()).unwrap(); | ||
| 194 | |||
| 195 | users.insert( | ||
| 196 | "60e77101e76950a9b1830fa107fd2f8fc545255b3e0f14b6a7797cf9ee005f07".to_owned(), | ||
| 197 | User { | ||
| 198 | user_id: friendly_4, | ||
| 199 | public_key: "not_used".to_owned(), | ||
| 200 | balance: 40, | ||
| 201 | is_bot: true, | ||
| 202 | }, | ||
| 203 | ); | ||
| 204 | |||
| 205 | Db { | ||
| 206 | blockchain: Arc::new(RwLock::new(Block::new())), | ||
| 207 | pending_transactions: Arc::new(RwLock::new(HashMap::new())), | ||
| 208 | users: Arc::new(RwLock::new(users)), | ||
| 209 | } | ||
| 210 | } | ||
| 211 | } | ||
| 212 | |||
| 213 | impl Default for Db { | ||
| 214 | fn default() -> Self { | ||
| 215 | Self::new() | ||
| 216 | } | ||
| 217 | } | ||
| 218 | |||
| 219 | /// A transaction between `source` and `target` that moves `amount` | ||
| 220 | #[derive(Serialize, Deserialize, Debug, Clone, PartialEq)] | ||
| 221 | pub struct Transaction { | ||
| 222 | pub source: Fingerprint, | ||
| 223 | pub target: Fingerprint, | ||
| 224 | pub amount: u16, | ||
| 225 | pub timestamp: NaiveDateTime, | ||
| 226 | } | ||
| 227 | |||
| 228 | /// A block that was proposed with `transaction_list` and `nonce` that made `hash` valid, 6 zeroes | ||
| 229 | /// at the left hand side of the hash (24 bytes) | ||
| 230 | /// | ||
| 231 | /// We are mining using blake2s algorithm, which produces 256 bit hashes. Hash/second is roughly | ||
| 232 | /// 20x10^3. | ||
| 233 | /// | ||
| 234 | /// https://serde.rs/container-attrs.html might be valuable to normalize the serialize/deserialize | ||
| 235 | /// conventions as these will be hashed | ||
| 236 | /// | ||
| 237 | #[derive(Serialize, Deserialize, Debug, PartialEq)] | ||
| 238 | pub struct Block { | ||
| 239 | #[serde(skip_serializing_if = "Vec::is_empty")] | ||
| 240 | pub transaction_list: Vec<Fingerprint>, | ||
| 241 | pub nonce: u32, | ||
| 242 | pub timestamp: NaiveDateTime, | ||
| 243 | pub hash: String, | ||
| 244 | } | ||
| 245 | |||
| 246 | /// For prototyping and letting serde handle everything json | ||
| 247 | #[derive(Serialize, Deserialize, Debug, PartialEq)] | ||
| 248 | pub struct NakedBlock { | ||
| 249 | #[serde(skip_serializing_if = "Vec::is_empty", default)] | ||
| 250 | pub transaction_list: Vec<Fingerprint>, | ||
| 251 | pub nonce: u32, | ||
| 252 | pub timestamp: NaiveDateTime, | ||
| 253 | } | ||
| 254 | |||
| 255 | impl Block { | ||
| 256 | /// Genesis block | ||
| 257 | pub fn new() -> Block { | ||
| 258 | Block { | ||
| 259 | transaction_list: vec!["gradecoin_bank".to_owned()], | ||
| 260 | nonce: 0, | ||
| 261 | timestamp: NaiveDate::from_ymd(2021, 4, 11).and_hms(20, 45, 00), | ||
| 262 | hash: String::from("not_actually_mined"), | ||
| 263 | } | ||
| 264 | } | ||
| 265 | } | ||
| 266 | |||
| 267 | impl Default for Block { | ||
| 268 | fn default() -> Self { | ||
| 269 | Self::new() | ||
| 270 | } | ||
| 271 | } | ||
| 272 | |||
| 273 | /// A Student | ||
| 274 | /// | ||
| 275 | /// * [`user_id`]: Can only be one of the repopulated | ||
| 276 | /// * [`public_key`]: A PEM format public key "---- BEGIN" and all | ||
| 277 | /// * [`balance`]: User's current Gradecoin amount | ||
| 278 | /// | ||
| 279 | /// This should ideally include the fingerprint as well? | ||
| 280 | #[derive(Serialize, Deserialize, Debug, PartialEq)] | ||
| 281 | pub struct User { | ||
| 282 | pub user_id: MetuId, | ||
| 283 | pub public_key: String, | ||
| 284 | pub balance: u16, | ||
| 285 | #[serde(skip, default = "bool::default")] | ||
| 286 | pub is_bot: bool, | ||
| 287 | } | ||
| 288 | |||
| 289 | /// The values are hard coded in [`OUR_STUDENTS`] so MetuId::new() can accept/reject values based on that | ||
| 290 | #[derive(Serialize, Deserialize, Debug, PartialEq, Clone)] | ||
| 291 | pub struct MetuId { | ||
| 292 | id: String, | ||
| 293 | passwd: String, | ||
| 294 | } | ||
| 295 | |||
| 296 | impl MetuId { | ||
| 297 | pub fn quick_equal(&self, other: &str) -> bool { | ||
| 298 | self.id == other | ||
| 299 | } | ||
| 300 | } | ||
| 301 | |||
| 302 | /// The plaintext of the initial user authentication request | ||
| 303 | #[derive(Serialize, Deserialize, Debug, PartialEq)] | ||
| 304 | pub struct AuthRequest { | ||
| 305 | pub student_id: String, | ||
| 306 | pub passwd: String, | ||
| 307 | pub public_key: String, | ||
| 308 | } | ||
| 309 | |||
| 310 | /// Ciphertext of the initial authentication request, or what we will receive | ||
| 311 | #[derive(Serialize, Deserialize, Debug)] | ||
| 312 | pub struct InitialAuthRequest { | ||
| 313 | pub c: String, | ||
| 314 | pub iv: String, | ||
| 315 | pub key: String, | ||
| 316 | } | ||
| 317 | |||
| 318 | // Students who are authorized to have Gradecoin accounts | ||
| 319 | lazy_static! { | ||
| 320 | static ref OUR_STUDENTS: HashSet<(&'static str, &'static str)> = { | ||
| 321 | [ | ||
| 322 | ("e254275", "DtNX1qk4YF4saRH"), | ||
| 323 | ("e223687", "cvFEs4XLjuGBD1v"), | ||
| 324 | ("e211024", "voQAcxiKJmEXYRT"), | ||
| 325 | ("e209888", "O75dli6AQtz2tUi"), | ||
| 326 | ("e223725", "xXuTD3Y4tyrv2Jz"), | ||
| 327 | ("e209362", "N7wGm5XU5zVWOWu"), | ||
| 328 | ("e209898", "aKBFfB8fZMq8pVn"), | ||
| 329 | ("e230995", "TgcHGlqeFhQGx42"), | ||
| 330 | ("e223743", "YVWVSWuIHplJk9C"), | ||
| 331 | ("e223747", "8LAeHrsjnwXh59Q"), | ||
| 332 | ("e223749", "HMFeJqVOzwCPHbc"), | ||
| 333 | ("e223751", "NjMsxmtmy2VOwMW"), | ||
| 334 | ("e188126", "QibuPdV2gXfsVJW"), | ||
| 335 | ("e209913", "kMxJvl2vHSWCy4A"), | ||
| 336 | ("e203608", "mfkkR0MWurk6Rp1"), | ||
| 337 | ("e233013", "GCqHxdOaDj2pWXx"), | ||
| 338 | ("e216982", "2Z0xmgCStnj5qg5"), | ||
| 339 | ("e217185", "BcaZNlzlhPph7A3"), | ||
| 340 | ("e223780", "2KvVxKUQaA9H4sn"), | ||
| 341 | ("e194931", "hsC0Wb8PQ5vzwdQ"), | ||
| 342 | ("e223783", "ETUJA3kt1QYvJai"), | ||
| 343 | ("e254550", "rPRjX0A4NefvKWi"), | ||
| 344 | ("e217203", "lN3IWhGyCrGfkk5"), | ||
| 345 | ("e217477", "O9xlMaa7LanC82w"), | ||
| 346 | ("e223786", "UxI6czykJfp9T9N"), | ||
| 347 | ("e231060", "VJgziofQQPCoisH"), | ||
| 348 | ("e223795", "pmcTCKox99NFsqp"), | ||
| 349 | ("e223715", "1H5QuOYI1b2r9ET"), | ||
| 350 | ("e181932", "THANKYOUHAVEFUN"), | ||
| 351 | ("bank", "P7oxDm30g1jeIId"), | ||
| 352 | ("friend_1", "not_used"), | ||
| 353 | ("friend_2", "not_used"), | ||
| 354 | ("friend_3", "not_used"), | ||
| 355 | ("friend_4", "not_used"), | ||
| 356 | ] | ||
| 357 | .iter() | ||
| 358 | .cloned() | ||
| 359 | .collect() | ||
| 360 | }; | ||
| 361 | } | ||
| 362 | |||
| 363 | impl fmt::Display for MetuId { | ||
| 364 | fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { | ||
| 365 | write!(f, "{}", self.id) | ||
| 366 | } | ||
| 367 | } | ||
| 368 | |||
| 369 | impl MetuId { | ||
| 370 | pub fn new(id: String, pwd: String) -> Option<Self> { | ||
| 371 | if OUR_STUDENTS.contains(&(&*id, &*pwd)) { | ||
| 372 | Some(MetuId { id, passwd: pwd }) | ||
| 373 | } else { | ||
| 374 | None | ||
| 375 | } | ||
| 376 | } | ||
| 377 | } | ||
diff --git a/src/student.rs b/src/student.rs new file mode 100644 index 0000000..4b7acf1 --- /dev/null +++ b/src/student.rs  | |||
| @@ -0,0 +1,96 @@ | |||
| 1 | use crate::Fingerprint; | ||
| 2 | use lazy_static::lazy_static; | ||
| 3 | use serde::{Deserialize, Serialize}; | ||
| 4 | use std::{collections::HashSet, fmt}; | ||
| 5 | |||
| 6 | #[derive(Debug, Serialize, Deserialize, PartialEq)] | ||
| 7 | pub struct UserAtRest { | ||
| 8 | pub fingerprint: Fingerprint, | ||
| 9 | pub user: User, | ||
| 10 | } | ||
| 11 | |||
| 12 | /// A Student | ||
| 13 | /// | ||
| 14 | /// - [`user_id`]: Can only be one of the preapproved students (who are enlisted in the course) | ||
| 15 | /// - [`public_key`]: A PEM format public key "---- BEGIN" and all | ||
| 16 | /// - [`balance`]: User's current Gradecoin amount | ||
| 17 | /// | ||
| 18 | /// This should ideally include the fingerprint as well? | ||
| 19 | #[derive(Serialize, Deserialize, Debug, PartialEq)] | ||
| 20 | pub struct User { | ||
| 21 | pub user_id: MetuId, | ||
| 22 | pub public_key: String, | ||
| 23 | pub balance: u16, | ||
| 24 | #[serde(skip, default = "bool::default")] | ||
| 25 | pub is_bot: bool, | ||
| 26 | } | ||
| 27 | |||
| 28 | /// The values are hard coded in [`static@OUR_STUDENTS`] so `MetuId::new`() can accept/reject values based on that | ||
| 29 | #[derive(Serialize, Deserialize, Debug, PartialEq, Clone)] | ||
| 30 | pub struct MetuId { | ||
| 31 | id: String, | ||
| 32 | passwd: String, | ||
| 33 | } | ||
| 34 | |||
| 35 | impl fmt::Display for MetuId { | ||
| 36 | fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { | ||
| 37 | write!(f, "{}", self.id) | ||
| 38 | } | ||
| 39 | } | ||
| 40 | |||
| 41 | impl MetuId { | ||
| 42 | pub fn new(id: String, pwd: String) -> Option<Self> { | ||
| 43 | if OUR_STUDENTS.contains(&(&*id, &*pwd)) { | ||
| 44 | Some(MetuId { id, passwd: pwd }) | ||
| 45 | } else { | ||
| 46 | None | ||
| 47 | } | ||
| 48 | } | ||
| 49 | } | ||
| 50 | |||
| 51 | // TODO: remove this, read from a yaml or something, then MetuId::new gets a self <11-04-22, yigit> // | ||
| 52 | |||
| 53 | // Students who are authorized to have Gradecoin accounts | ||
| 54 | lazy_static! { | ||
| 55 | static ref OUR_STUDENTS: HashSet<(&'static str, &'static str)> = { | ||
| 56 | [ | ||
| 57 | ("e254275", "DtNX1qk4YF4saRH"), | ||
| 58 | ("e223687", "cvFEs4XLjuGBD1v"), | ||
| 59 | ("e211024", "voQAcxiKJmEXYRT"), | ||
| 60 | ("e209888", "O75dli6AQtz2tUi"), | ||
| 61 | ("e223725", "xXuTD3Y4tyrv2Jz"), | ||
| 62 | ("e209362", "N7wGm5XU5zVWOWu"), | ||
| 63 | ("e209898", "aKBFfB8fZMq8pVn"), | ||
| 64 | ("e230995", "TgcHGlqeFhQGx42"), | ||
| 65 | ("e223743", "YVWVSWuIHplJk9C"), | ||
| 66 | ("e223747", "8LAeHrsjnwXh59Q"), | ||
| 67 | ("e223749", "HMFeJqVOzwCPHbc"), | ||
| 68 | ("e223751", "NjMsxmtmy2VOwMW"), | ||
| 69 | ("e188126", "QibuPdV2gXfsVJW"), | ||
| 70 | ("e209913", "kMxJvl2vHSWCy4A"), | ||
| 71 | ("e203608", "mfkkR0MWurk6Rp1"), | ||
| 72 | ("e233013", "GCqHxdOaDj2pWXx"), | ||
| 73 | ("e216982", "2Z0xmgCStnj5qg5"), | ||
| 74 | ("e217185", "BcaZNlzlhPph7A3"), | ||
| 75 | ("e223780", "2KvVxKUQaA9H4sn"), | ||
| 76 | ("e194931", "hsC0Wb8PQ5vzwdQ"), | ||
| 77 | ("e223783", "ETUJA3kt1QYvJai"), | ||
| 78 | ("e254550", "rPRjX0A4NefvKWi"), | ||
| 79 | ("e217203", "lN3IWhGyCrGfkk5"), | ||
| 80 | ("e217477", "O9xlMaa7LanC82w"), | ||
| 81 | ("e223786", "UxI6czykJfp9T9N"), | ||
| 82 | ("e231060", "VJgziofQQPCoisH"), | ||
| 83 | ("e223795", "pmcTCKox99NFsqp"), | ||
| 84 | ("e223715", "1H5QuOYI1b2r9ET"), | ||
| 85 | ("e181932", "THANKYOUHAVEFUN"), | ||
| 86 | ("bank", "P7oxDm30g1jeIId"), | ||
| 87 | ("friend_1", "not_used"), | ||
| 88 | ("friend_2", "not_used"), | ||
| 89 | ("friend_3", "not_used"), | ||
| 90 | ("friend_4", "not_used"), | ||
| 91 | ] | ||
| 92 | .iter() | ||
| 93 | .copied() | ||
| 94 | .collect() | ||
| 95 | }; | ||
| 96 | } | ||
