signing random messages from user
This commit is contained in:
		
							parent
							
								
									701c2c6010
								
							
						
					
					
						commit
						60b26344d6
					
				| @ -1,11 +1,44 @@ | ||||
| #![allow(dead_code)] | ||||
| use ed25519_dalek::{SigningKey, VerifyingKey}; | ||||
| use ed25519_dalek::{Signer, SigningKey, VerifyingKey}; | ||||
| use once_cell::sync::Lazy; | ||||
| use std::collections::HashMap; | ||||
| use std::sync::Mutex; | ||||
| use std::time::SystemTime; | ||||
| use tabled::{Table, Tabled}; | ||||
| 
 | ||||
| pub enum SigningError { | ||||
|     CorruptedKey, | ||||
|     KeyNotFound, | ||||
| } | ||||
| 
 | ||||
| impl std::fmt::Display for SigningError { | ||||
|     fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { | ||||
|         let error_message = match self { | ||||
|             SigningError::CorruptedKey => "The public key is corrupted", | ||||
|             SigningError::KeyNotFound => "Did not find the public key", | ||||
|         }; | ||||
|         write!(f, "{}", error_message) | ||||
|     } | ||||
| } | ||||
| 
 | ||||
| impl From<hex::FromHexError> for SigningError { | ||||
|     fn from(_: hex::FromHexError) -> Self { | ||||
|         Self::CorruptedKey | ||||
|     } | ||||
| } | ||||
| 
 | ||||
| impl From<ed25519_dalek::ed25519::Error> for SigningError { | ||||
|     fn from(_: ed25519_dalek::ed25519::Error) -> Self { | ||||
|         Self::CorruptedKey | ||||
|     } | ||||
| } | ||||
| 
 | ||||
| impl From<std::array::TryFromSliceError> for SigningError { | ||||
|     fn from(_: std::array::TryFromSliceError) -> Self { | ||||
|         Self::CorruptedKey | ||||
|     } | ||||
| } | ||||
| 
 | ||||
| #[derive(Clone)] | ||||
| pub struct NodeInfo { | ||||
|     pub pubkey: VerifyingKey, | ||||
| @ -27,11 +60,29 @@ pub fn remove_key(pubkey: &VerifyingKey) { | ||||
|     keys.remove(pubkey); | ||||
| } | ||||
| 
 | ||||
| pub fn get_privkey(pubkey: &VerifyingKey) -> Option<SigningKey> { | ||||
| fn get_privkey(pubkey: &VerifyingKey) -> Option<SigningKey> { | ||||
|     let keys = KEYS.lock().unwrap(); | ||||
|     keys.get(pubkey).cloned() | ||||
| } | ||||
| 
 | ||||
| pub fn sign_message_with_key(pubkey: &str, message: &str) -> Result<String, SigningError> { | ||||
|     // Parse the hex string into a VerifyingKey
 | ||||
|     let key_bytes = hex::decode(pubkey)?; | ||||
|     let pubkey = VerifyingKey::from_bytes(&key_bytes.as_slice().try_into()?)?; | ||||
| 
 | ||||
|     // Lock the hashmap and try to get the SigningKey
 | ||||
|     let key_store = KEYS.lock().unwrap(); | ||||
|     let signing_key = match key_store.get(&pubkey) { | ||||
|         Some(k) => k, | ||||
|         None => return Err(SigningError::KeyNotFound), | ||||
|     }; | ||||
| 
 | ||||
|     // TODO: check if to_bytes returns the signature in a format that people can verify from bash
 | ||||
|     let signature = hex::encode(signing_key.sign(message.as_bytes()).to_bytes()); | ||||
| 
 | ||||
|     Ok(signature) | ||||
| } | ||||
| 
 | ||||
| pub fn add_node(ip: String, info: NodeInfo) { | ||||
|     let mut nodes = NODES.lock().unwrap(); | ||||
|     nodes.insert(ip, info); | ||||
|  | ||||
| @ -4,11 +4,13 @@ use rand::rngs::OsRng; | ||||
| 
 | ||||
| pub fn add_node(ip: String) { | ||||
|     let mut csprng = OsRng; | ||||
|     let privkey = ed25519_dalek::SigningKey::generate(&mut csprng); | ||||
|     database::add_node( | ||||
|         ip, | ||||
|         NodeInfo { | ||||
|             pubkey: ed25519_dalek::SigningKey::generate(&mut csprng).verifying_key(), | ||||
|             pubkey: privkey.verifying_key(), | ||||
|             updated_at: std::time::SystemTime::now(), | ||||
|         }, | ||||
|     ) | ||||
|     ); | ||||
|     database::add_key(privkey.verifying_key(), privkey); | ||||
| } | ||||
|  | ||||
| @ -1,14 +1,34 @@ | ||||
| use salvo::prelude::*; | ||||
| use crate::database::get_nodes_as_html_tabe; | ||||
| use salvo::prelude::*; | ||||
| 
 | ||||
| #[handler] | ||||
| async fn homepage() -> String { | ||||
|     get_nodes_as_html_tabe() | ||||
| } | ||||
| 
 | ||||
| #[handler] | ||||
| async fn sign(req: &mut Request) -> String { | ||||
|     let pubkey = match req.query::<String>("pubkey") { | ||||
|         Some(k) => k, | ||||
|         None => return "pubkey must be specified as GET param".to_string(), | ||||
|     }; | ||||
| 
 | ||||
|     let something = match req.query::<String>("something") { | ||||
|         Some(k) => k, | ||||
|         None => return "something must be specified as GET param".to_string(), | ||||
|     }; | ||||
| 
 | ||||
|     match crate::database::sign_message_with_key(&pubkey, &something) { | ||||
|         Ok(s) => s, | ||||
|         Err(e) => e.to_string(), | ||||
|     } | ||||
| } | ||||
| 
 | ||||
| pub async fn start() { | ||||
|     let acceptor = TcpListener::new("0.0.0.0:5800").bind().await; | ||||
|     let router = Router::new().get(homepage); | ||||
|     let router = Router::new() | ||||
|         .get(homepage) | ||||
|         .push(Router::with_path("sign").get(sign)); | ||||
|     println!("{:?}", router); | ||||
|     Server::new(acceptor).serve(router).await; | ||||
| } | ||||
|  | ||||
		Loading…
	
		Reference in New Issue
	
	Block a user