/// API handlers, the ends of each filter chain use crate::block::{AuthRequest, Block, Claims, InitialAuthRequest, NakedBlock, Transaction}; use crate::student::{MetuId, User, UserAtRest}; use crate::Db; use aes::Aes128; use askama::Template; use blake2::{Blake2s, Digest}; use block_modes::{block_padding::Pkcs7, BlockMode, Cbc}; use chrono::Utc; use jsonwebtoken::errors::ErrorKind; use jsonwebtoken::{decode, Algorithm, DecodingKey, TokenData, Validation}; use lazy_static::lazy_static; use log::{debug, warn}; use md5::Md5; use parking_lot::RwLockUpgradableReadGuard; use rsa::{PaddingScheme, RSAPrivateKey}; use serde::Serialize; use sha2::Sha256; use std::{ collections::{HashMap, HashSet}, convert::Infallible, fs, hash::Hash, }; use warp::{http::StatusCode, reply}; use crate::PRIVATE_KEY; // Encryption primitive type Aes128Cbc = Cbc; #[derive(Serialize, Debug)] struct UserFeedback { res: ResponseType, message: String, } #[derive(Debug, Serialize)] enum ResponseType { Success, Error, } const BEARER: &str = "Bearer "; lazy_static! { static ref DER_ENCODED: String = PRIVATE_KEY .lines() .filter(|line| !line.starts_with('-')) .fold(String::new(), |mut data, line| { data.push_str(line); data }); // base64(der(pem)) // Our private key is saved in PEM (base64) format static ref DER_BYTES: Vec = base64::decode(&*DER_ENCODED).expect("failed to decode base64 content"); static ref GRADECOIN_PRIVATE_KEY: RSAPrivateKey = RSAPrivateKey::from_pkcs1(&DER_BYTES).expect("failed to parse key"); } /// POST request to /register endpoint /// /// Lets a [`User`] (=student) to authenticate themselves to the system /// This `request` can be rejected if the payload is malformed (=not authenticated properly) or if /// the [`AuthRequest.user_id`] of the `request` is not in the list of users that can hold a Gradecoin account /// /// # Authentication Process /// - Gradecoin's Public Key (`gradecoin_public_key`) is listed on moodle. /// - Gradecoin's Private Key (`gradecoin_private_key`) is loaded here /// /// - Student picks a short temporary key (`k_temp`) /// - Creates a JSON object (`auth_plaintext`) with their `metu_id` and `public key` in base64 (PEM) format (`S_PK`): /// { /// `student_id`: "e12345", /// `passwd`: "15 char secret" /// `public_key`: "---BEGIN PUBLIC KEY..." /// } /// /// - Encrypts the serialized string of `auth_plaintext` with 128 bit block AES in CBC mode with Pkcs7 padding using the temporary key (`k_temp`), the result is `auth_ciphertext` /// - The temporary key student has picked `k_temp` is encrypted using RSA with OAEP padding scheme /// using sha256 with `gradecoin_public_key`, giving us `key_ciphertext` /// - The payload JSON object (`auth_request`) can be JSON serialized now: /// { /// c: "`auth_ciphertext`" /// key: "`key_ciphertext`" /// } /// /// ## Gradecoin Side /// /// - Upon receiving, we first RSA decrypt with OAEP padding scheme using SHA256 with `gradecoin_private_key` as the key and `auth_request.key` `key` as the ciphertext, receiving `temp_key` (this is the temporary key chosen by student) /// - With `temp_key`, we can AES 128 Cbc Pkcs7 decrypt the `auth_request.c`, giving us `auth_plaintext` /// - The `auth_plaintext` String can be deserialized to [`AuthRequest`] /// - We then verify the payload and calculate the User fingerprint /// - Finally, create the new [`User`] object, insert to users `HashMap` `` /// #[allow(clippy::too_many_lines)] // temporary, should be refactored pub async fn authenticate_user( request: InitialAuthRequest, db: Db, ) -> Result { debug!("[{}] New user registration attempt", db.config.name); // In essence PEM files are just base64 encoded versions of the DER encoded data. // ~tls.mbed.org let padding = PaddingScheme::new_oaep::(); // Peel away the base64 layer from "key" field let key_ciphertext = match base64::decode(&request.key) { Ok(c) => c, Err(err) => { debug!( "\"key\" field of initial auth request was not base64 encoded: {}, {}", &request.key, err ); let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: format!( "\"key\" field of initial auth request was not base64 encoded: {}, {}", &request.key, err ), }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); } }; // Decrypt the "key" field using Gradecoin's private key let temp_key = match GRADECOIN_PRIVATE_KEY.decrypt(padding, &key_ciphertext) { Ok(k) => k, Err(err) => { debug!( "Failed to decrypt ciphertext of the key with Gradecoin's public key: {}. Key was {:?}", err, &key_ciphertext ); let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "Failed to decrypt the 'key_ciphertext' field of the auth request" .to_owned(), }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); } }; // Peel away the base64 from the iv field as well let byte_iv = match base64::decode(&request.iv) { Ok(iv) => iv, Err(err) => { debug!( "\"iv\" field of initial auth request was not base64 encoded: {}, {}", &request.iv, err ); let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: format!( "\"iv\" field of initial auth request was not base64 encoded: {}, {}", &request.iv, err ), }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); } }; // we have key and iv, time to decrypt the "c" field, first prepare the decryptor let cipher = match Aes128Cbc::new_var(&temp_key, &byte_iv) { Ok(c) => c, Err(err) => { debug!( "Could not create a cipher from temp_key and request.iv {:?}, {}, {}", &temp_key, &request.iv, err ); let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: format!( "Could not create a cipher from given 'temp_key': {:?} and 'IV': {}, {}", &temp_key, &request.iv, err ), }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); } }; // peel away the base64 from the auth packet let auth_packet = match base64::decode(&request.c) { Ok(a) => a, Err(err) => { debug!( "\"c\" field of initial auth request was not base64 encoded: {}, {}", &request.c, err ); let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: format!( "\"c\" field of initial auth request was not base64 encoded: {}, {}", &request.c, err ), }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); } }; // c field was properly base64 encoded, now available in auth_packet // decryptor was setup properly, with the correct length key let mut buf = auth_packet; let auth_plaintext = match cipher.decrypt(&mut buf) { Ok(p) => p, Err(err) => { println!( "auth request (c) did not decrypt correctly {:?} {}", &buf, err ); let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "Failed to decrypt the 'c' field of the auth request, 'iv' and 'k_temp' were valid so far though" .to_owned(), }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); } }; // we have a decrypted c field, create a string from the bytes mess let utf8_auth_plaintext = match String::from_utf8(auth_plaintext.to_vec()) { Ok(text) => text, Err(err) => { debug!( "Auth plaintext did not convert into utf8 {:?} {}", &auth_plaintext, err ); let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "P_AR couldn't get converted to UTF-8, please check your encoding" .to_owned(), }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); } }; // finally create an AuthRequest object from the plaintext let request: AuthRequest = match serde_json::from_str(&utf8_auth_plaintext) { Ok(req) => req, Err(err) => { debug!( "Auth plaintext did not serialize correctly {:?} {}", &utf8_auth_plaintext, err ); let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "The P_AR JSON did not serialize correctly, did it include all 3 fields 'student_id', 'passwd' and 'public_key'?".to_owned(), }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); } }; // is the student in AuthRequest privileged? let privileged_student_id = if db.is_user_preapproved(&request.student_id, &request.passwd) { MetuId::new(request.student_id.clone(), request.passwd.clone()) } else { debug!( "Someone tried to auth with invalid credentials: {} {}", &request.student_id, &request.passwd ); let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "The credentials given ('student_id', 'passwd') cannot hold a Gradecoin account" .to_owned(), }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); }; // Students should be able to authenticate once { let userlist = db.users.read(); for (_, user) in userlist.iter() { if user.user_id == privileged_student_id { debug!("{} attempted to authenticate again", user.user_id); let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "This user is already authenticated, do you think this is a mistake? Contact me" .to_owned(), }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); } } } // We're using this as the validator instead of anything reasonable if DecodingKey::from_rsa_pem(request.public_key.as_bytes()).is_err() { let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "The RSA 'public_key' in 'P_AR' is not in valid PEM format".to_owned(), }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); } let fingerprint = format!("{:x}", Sha256::digest(request.public_key.as_bytes())); let new_user = User { user_id: privileged_student_id, public_key: request.public_key, balance: db.config.register_bonus, is_bot: false, }; warn!("A new user has authenticated: {}", &new_user.user_id); // save the user to disk let user_at_rest_json = serde_json::to_string(&UserAtRest { fingerprint: fingerprint.clone(), user: User { user_id: new_user.user_id.clone(), public_key: new_user.public_key.clone(), balance: new_user.balance, is_bot: false, }, }) .unwrap(); write_guy_file(&db.config.name, &new_user.user_id, &user_at_rest_json); let mut userlist = db.users.write(); userlist.insert(fingerprint.clone(), new_user); let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Success, message: format!( "You have authenticated to use Gradecoin with identifier {}", fingerprint ), }); Ok(warp::reply::with_status(res_json, StatusCode::CREATED)) } /// GET /config /// Returns the configuration settings of this network in JSON. pub async fn get_config(db: Db) -> Result { Ok(reply::with_status(reply::json(&db.config), StatusCode::OK)) } /// GET /version /// Returns the current project version, as defined in Cargo.toml pub async fn get_version() -> Result { Ok(reply::with_status( reply::html(format!( "{} - version {}", env!("CARGO_PKG_NAME"), env!("CARGO_PKG_VERSION") )), StatusCode::OK, )) } /// GET /transaction /// Returns JSON array of transactions pub async fn list_transactions(db: Db) -> Result { let mut result = HashMap::new(); let transactions = db.pending_transactions.read(); for (fp, tx) in transactions.iter() { result.insert(fp, tx); } Ok(reply::with_status(reply::json(&result), StatusCode::OK)) } /// POST /block /// /// Proposes a new block for the next round. /// Can reject the block /// /// The proposer has to put their transaction as the first transaction of the `Block::transaction_list`. /// This is the analogue of `coinbase` in Bitcoin works /// /// The `coinbase` transaction also gets something for their efforts. #[allow(clippy::too_many_lines)] // temporary, should be refactored pub async fn propose_block( new_block: Block, token: String, db: Db, ) -> Result { warn!("[{}] New block proposal: {:?}", db.config.name, &new_block); // Check if there are enough transactions in the block let block_transaction_count = db.config.block_transaction_count; if new_block.transaction_list.len() < block_transaction_count as usize { debug!( "{} transactions offered, needed {}", new_block.transaction_list.len(), block_transaction_count ); let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: format!( "There should be at least {} transactions in the block", block_transaction_count ), }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); } // proposer (first transaction fingerprint) checks let pending_transactions = db.pending_transactions.upgradable_read(); // we get the proposers fingerprint by finding the transaction (id) then extracting the source let internal_user_fingerprint = if let Some(coinbase) = pending_transactions.get(&new_block.transaction_list[0]) { &coinbase.source } else { debug!( "Transaction with id {} is not found in the pending_transactions", new_block.transaction_list[0] ); let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "First transaction in the block is not found in the system".to_owned(), }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); }; let users_store = db.users.upgradable_read(); // this probably cannot fail, if the transaction is valid then it must've been checked already let internal_user = if let Some(existing_user) = users_store.get(internal_user_fingerprint) { existing_user } else { debug!( "User with public key signature {:?} is not found in the database", new_block.transaction_list[0] ); let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "User with that public key signature is not found in the database".to_owned(), }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); }; let proposer_public_key = &internal_user.public_key; // JWT Check let token_payload = match authorize_proposer(&token, proposer_public_key) { Ok(data) => data, Err(below) => { debug!("Something went wrong with the JWT {:?}", below); let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: below, }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); } }; // Block hash check if token_payload.claims.tha != new_block.hash { debug!( "The Hash of the block {:?} did not match the hash given in jwt {:?}", new_block.hash, token_payload.claims.tha ); let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "The hash of the block did not match the hash given in JWT tha field" .to_owned(), }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); } if !has_unique_elements(&new_block.transaction_list) { debug!("Block contains duplicate transactions!"); let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "Block cannot contain duplicate transactions".to_owned(), }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); } // Are transactions in the block valid? for transaction_hash in &new_block.transaction_list { if !pending_transactions.contains_key(transaction_hash) { let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "Block contains an unknown transaction".to_owned(), }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); } } // hash the block ourselves to double check let naked_block = NakedBlock { transaction_list: new_block.transaction_list.clone(), nonce: new_block.nonce, timestamp: new_block.timestamp, }; let naked_block_flat = serde_json::to_vec(&naked_block).unwrap(); let hashvalue = Blake2s::digest(&naked_block_flat); let hash_string = format!("{:x}", hashvalue); // Does the hash claimed in block match with the actual hash? if hash_string != new_block.hash { debug!("request was not telling the truth, hash values do not match"); let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "Given hash value does not match the actual block hash".to_owned(), }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); } // Are the n leftmost characters zero? let hash_correct = hash_string .chars() .take(db.config.hash_zeros.into()) .all(|x| x == '0'); if !hash_correct { debug!( "The hash does not have {} leftmost zero characters", db.config.hash_zeros ); let res_json = warp::reply::json(&UserFeedback { res: ResponseType::Error, message: format!( "Given block hash does not start with {} zero hexadecimal characters", db.config.hash_zeros ), }); return Ok(warp::reply::with_status(res_json, StatusCode::BAD_REQUEST)); } // All clear, block accepted! warn!("[{}] ACCEPTED BLOCK {:?}", db.config.name, new_block); // Scope the read guards { let mut pending_transactions = RwLockUpgradableReadGuard::upgrade(pending_transactions); let mut users_store = RwLockUpgradableReadGuard::upgrade(users_store); // Reward the block proposer // All unwrap calls here are guaranteed to succeed because they are already checked above // See: internal_user_fingerprint, internal_user let coinbase = pending_transactions .get(&new_block.transaction_list[0]) .unwrap(); let mut coinbase_user = users_store.get_mut(&coinbase.source).unwrap(); coinbase_user.balance += db.config.block_reward; debug!( "{} block reward went to {} for mining the block", db.config.block_reward, coinbase_user.user_id ); let mut holding: HashMap = HashMap::new(); // Play out the transactions for fingerprint in &new_block.transaction_list { if let Some(transaction) = pending_transactions.remove(fingerprint) { let source = &transaction.source; let target = &transaction.target; if let Some(from) = users_store.get_mut(source) { from.balance -= transaction.amount - db.config.tx_traffic_reward; } if let Some(to) = users_store.get_mut(target) { to.balance += transaction.amount; } // if the receiver is a bot, they will reciprocate if users_store.get(target).unwrap().is_bot { let transaction_id = calculate_transaction_id(target, source); holding.insert( transaction_id, Transaction { source: target.clone(), target: source.clone(), amount: transaction.amount, timestamp: Utc::now().naive_local(), }, ); } } } for (fp, tx) in &holding { pending_transactions.insert(fp.clone(), tx.clone()); } // just update everyone's .guy file for (fp, user) in users_store.iter() { if !user.is_bot { let user_at_rest_json = serde_json::to_string(&UserAtRest { fingerprint: fp.clone(), user: User { user_id: user.user_id.clone(), public_key: user.public_key.clone(), balance: user.balance, is_bot: false, }, }) .unwrap(); write_guy_file(&db.config.name, &user.user_id, &user_at_rest_json); } } } let block_json = serde_json::to_string(&new_block).unwrap(); write_block( &db.config.name, new_block.timestamp.timestamp(), &block_json, ); { let mut blockchain = db.blockchain.write(); *blockchain = new_block; } Ok(warp::reply::with_status( warp::reply::json(&UserFeedback { res: ResponseType::Success, message: "Block accepted, coinbase reward awarded".to_owned(), }), StatusCode::CREATED, )) } async fn deduct_gas_fee( new_transaction: &Transaction, token: &str, db: Db, ) -> Option> { let mut users_store = db.users.write(); // Is this transaction from an authorized source? let mut internal_user: &mut User = if let Some(existing_user) = users_store.get_mut(&new_transaction.source) { existing_user } else { debug!( "User with public key signature {:?} is not found in the database", new_transaction.source ); return Some(warp::reply::with_status( warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "User with the given public key signature is not authorized".to_owned(), }), StatusCode::BAD_REQUEST, )); }; // This check is early on because bots don't have public keys, avoiding undefined behaviour if internal_user.is_bot { debug!("Someone tried to send as a bot"); return Some(warp::reply::with_status( warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "Don't send transactions on behalf of bots".to_owned(), }), StatusCode::BAD_REQUEST, )); } // This public key was already written to the database, we can panic if it's not valid at // *this* point let proposer_public_key = &internal_user.public_key; let token_payload = match authorize_proposer(token, proposer_public_key) { Ok(data) => data, Err(below) => { debug!("JWT Error: {:?}", below); return Some(warp::reply::with_status( warp::reply::json(&UserFeedback { res: ResponseType::Error, message: below, }), StatusCode::BAD_REQUEST, )); } }; // this transaction was already checked for correctness at custom_filters we can panic here if // it has been changed since let serd_tx = serde_json::to_string(&new_transaction).unwrap(); debug!("Taking the hash of {}", serd_tx); let hashed_transaction = Md5::digest(serd_tx.as_bytes()); if token_payload.claims.tha != format!("{:x}", hashed_transaction) { return Some(warp::reply::with_status( warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "The hash of the transaction did not match the hash given in JWT" .to_owned(), }), StatusCode::BAD_REQUEST, )); } // At this point we have authorized the user // Deduct gas fee to process the transaction further if internal_user.balance < db.config.tx_gas_fee { debug!( "User does not have enough balance ({}) to pay for the gas fee", internal_user.balance ); return Some(warp::reply::with_status( warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "You cannot afford the gas fee for this transaction".to_owned(), }), StatusCode::BAD_REQUEST, )); } internal_user.balance -= db.config.tx_gas_fee; None } /// POST /transaction /// /// Handles the new transaction requests /// Can reject the block if; /// # Arguments /// * `new_transaction` - Valid JSON of a [`Transaction`] /// * `token` - An Authorization header value such as `Bearer aaa.bbb.ccc` /// * `db` - Global [`Db`] instance /// #[allow(clippy::too_many_lines)] // temporary, should be refactored pub async fn propose_transaction( new_transaction: Transaction, token: String, db: Db, ) -> Result { warn!( "[{}] New transaction proposal: {:?}", db.config.name, &new_transaction ); if let Some(error) = deduct_gas_fee(&new_transaction, &token, db.clone()).await { return Ok(error); } // Gas fee exists to discourage dumb bots // Checks from this point on will be penalized as they already paid the gas fee but can still // fail let users_store = db.users.read(); // We _can_ get the internal user from deduct_gas_fee but that one is a mutable reference // We only need an unmutable reference from here on out, so unless something better comes along // this is how we get the second internal_user let internal_user = if let Some(existing_user) = users_store.get(&new_transaction.source) { existing_user } else { debug!( "User with public key signature {:?} is not found in the database", new_transaction.source ); return Ok(warp::reply::with_status( warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "User with the given public key signature is not authorized".to_owned(), }), StatusCode::BAD_REQUEST, )); }; // is the target of the transaction in the system? if !users_store.contains_key(&new_transaction.target) { debug!( "Target of the transaction is not in the system {}", new_transaction.target ); return Ok(warp::reply::with_status( warp::reply::json(&UserFeedback { res: ResponseType::Error, message: format!( "Target of the transaction {} is not found in the system", new_transaction.target ), }), StatusCode::BAD_REQUEST, )); } // Is this a duplicate transaction { let transactions = db.pending_transactions.read(); debug!( "This is a transaction from {} to {}", new_transaction.source, new_transaction.target, ); for tx in transactions.values() { if tx.source == new_transaction.source && tx.target == new_transaction.target { debug!( "There is already a transaction from {} to {}", new_transaction.source, new_transaction.target ); return Ok(warp::reply::with_status( warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "This user already has another pending transaction with this recipient" .to_owned(), }), StatusCode::BAD_REQUEST, )); } } } if new_transaction.source == new_transaction.target { debug!("transaction source and target are the same",); return Ok(warp::reply::with_status( warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "transaction to yourself, you had to try didn't you? :)".to_owned(), }), StatusCode::BAD_REQUEST, )); } // Is transaction amount within bounds let tx_upper_limit = db.config.tx_upper_limit; let tx_lower_limit = db.config.tx_lower_limit; if new_transaction.amount > tx_upper_limit || new_transaction.amount < tx_lower_limit { debug!( "Transaction amount is not between {} and {}, was {}", tx_lower_limit, tx_upper_limit, new_transaction.amount ); return Ok(warp::reply::with_status( warp::reply::json(&UserFeedback { res: ResponseType::Error, message: format!( "Transaction amount should be between {} and {}", tx_lower_limit, tx_upper_limit ), }), StatusCode::BAD_REQUEST, )); } // check if user can afford the transaction if internal_user.balance < new_transaction.amount { debug!( "User does not have enough balance ({}) for this TX {}", internal_user.balance, new_transaction.amount ); return Ok(warp::reply::with_status( warp::reply::json(&UserFeedback { res: ResponseType::Error, message: "User does not have enough balance in their account for this transaction" .to_owned(), }), StatusCode::BAD_REQUEST, )); } warn!( "[{}] ACCEPTED TRANSACTION {:?}", db.config.name, new_transaction ); let mut transactions = db.pending_transactions.write(); let transaction_id = calculate_transaction_id(&new_transaction.source, &new_transaction.target); transactions.insert(transaction_id, new_transaction); Ok(warp::reply::with_status( warp::reply::json(&UserFeedback { res: ResponseType::Success, message: "Transaction accepted".to_owned(), }), StatusCode::CREATED, )) } /// GET /block /// Returns the last block's JSON /// Cannot fail pub async fn list_blocks(db: Db) -> Result { let block = db.blockchain.read(); Ok(reply::with_status(reply::json(&*block), StatusCode::OK)) } /// GET /user /// Returns an HTML file with the current standing of users pub async fn user_list_handler(db: Db) -> Result { let users = db.users.read(); let mut sane_users = Vec::new(); for (fingerprint, user) in users.iter() { sane_users.push(DisplayUsers { fingerprint: fingerprint.clone(), balance: user.balance, is_bot: user.is_bot, }); } let template = UserTemplate { users: &sane_users }; let res = template.render().unwrap(); Ok(warp::reply::html(res)) } /// Handles the JWT Authorization /// /// *[`jwt_token`]: The raw JWT token, "Bearer aaa.bbb.ccc" /// *[`user_pem`]: User Public Key, "BEGIN RSA" /// NOT async, might look into it if this becomes a bottleneck fn authorize_proposer(jwt_token: &str, user_pem: &str) -> Result, String> { // Throw away the "Bearer " part let raw_jwt = jwt_token.trim_start_matches(BEARER).to_owned(); // Extract a jsonwebtoken compatible decoding_key from user's public key let decoding_key = match DecodingKey::from_rsa_pem(user_pem.as_bytes()) { Ok(key) => key, Err(j) => { warn!( "given RSA key {} is invalid, we should crash and burn here {:?}", user_pem, j ); return Err(String::from("This User's RSA key is invalid")); } }; // Extract the payload inside the JWT let token_payload = match decode::(&raw_jwt, &decoding_key, &Validation::new(Algorithm::RS256)) { Ok(decoded) => decoded, Err(err) => match *err.kind() { ErrorKind::InvalidToken => { debug!("raw_jwt={:?} was malformed err={:?}", raw_jwt, err); return Err(String::from("Invalid Token")); } ErrorKind::InvalidRsaKey => { debug!("The RSA key does not have a valid format, {:?}", err); return Err(String::from("The RSA key does not have a valid format")); } ErrorKind::ExpiredSignature => { debug!("this token has expired {:?}", err); return Err(String::from("This token has expired")); } _ => { warn!( "AN UNSPECIFIED ERROR from token: {}\nerr: {:?} key was {}", raw_jwt, err, user_pem ); return Err(format!("JWT Error: {}", err)); } }, }; Ok(token_payload) } fn write_guy_file(network_name: &str, guy: &MetuId, content: &str) { fs::write(format!("users/{}/{}.guy", network_name, guy), content).unwrap(); } fn write_block(network_name: &str, timestamp: i64, block: &str) { fs::write( format!("blocks/{}/{}.block", network_name, timestamp), block, ) .unwrap(); } fn calculate_transaction_id(source: &str, target: &str) -> String { let long_fingerprint = format!("{}{}{}", source, target, Utc::now()); let id = format!("{:x}", Sha256::digest(long_fingerprint.as_bytes())); id } #[derive(Template)] #[template(path = "list.html")] struct UserTemplate<'a> { users: &'a Vec, } struct DisplayUsers { fingerprint: String, balance: u16, is_bot: bool, } fn has_unique_elements(iter: T) -> bool where T: IntoIterator, T::Item: Eq + Hash, { let mut uniq = HashSet::new(); iter.into_iter().all(move |x| uniq.insert(x)) }