succesfully injecting datastore into webserver
This commit is contained in:
parent
32fcfcb385
commit
4f2cec3fa7
97
Cargo.lock
generated
97
Cargo.lock
generated
@ -470,6 +470,16 @@ dependencies = [
|
||||
"windows-sys 0.52.0",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "etag"
|
||||
version = "4.0.0"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "4b3d0661a2ccddc26cba0b834e9b717959ed6fdd76c7129ee159c170a875bf44"
|
||||
dependencies = [
|
||||
"str-buf",
|
||||
"xxhash-rust",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "fastrand"
|
||||
version = "2.1.0"
|
||||
@ -669,6 +679,7 @@ dependencies = [
|
||||
name = "hacker-challenge"
|
||||
version = "0.1.0"
|
||||
dependencies = [
|
||||
"anyhow",
|
||||
"ed25519-dalek",
|
||||
"futures",
|
||||
"hex",
|
||||
@ -1677,6 +1688,7 @@ dependencies = [
|
||||
"salvo-jwt-auth",
|
||||
"salvo-proxy",
|
||||
"salvo_core",
|
||||
"salvo_extra",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
@ -1772,6 +1784,26 @@ dependencies = [
|
||||
"tracing",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "salvo_extra"
|
||||
version = "0.70.0"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "11a1d577b798b1fd642bc8d3a80b2bb9299c9236a0a2e072c597099daee28557"
|
||||
dependencies = [
|
||||
"base64 0.22.1",
|
||||
"etag",
|
||||
"futures-util",
|
||||
"hyper",
|
||||
"pin-project",
|
||||
"salvo_core",
|
||||
"serde",
|
||||
"serde_json",
|
||||
"tokio",
|
||||
"tokio-tungstenite",
|
||||
"tracing",
|
||||
"ulid",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "salvo_macros"
|
||||
version = "0.70.0"
|
||||
@ -1976,6 +2008,12 @@ dependencies = [
|
||||
"der",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "str-buf"
|
||||
version = "3.0.3"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "0ceb97b7225c713c2fd4db0153cb6b3cab244eb37900c3f634ed4d43310d8c34"
|
||||
|
||||
[[package]]
|
||||
name = "subtle"
|
||||
version = "2.6.1"
|
||||
@ -2198,6 +2236,18 @@ dependencies = [
|
||||
"tokio",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "tokio-tungstenite"
|
||||
version = "0.23.1"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "c6989540ced10490aaf14e6bad2e3d33728a2813310a0c71d1574304c49631cd"
|
||||
dependencies = [
|
||||
"futures-util",
|
||||
"log",
|
||||
"tokio",
|
||||
"tungstenite",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "tokio-util"
|
||||
version = "0.7.11"
|
||||
@ -2340,12 +2390,37 @@ version = "0.2.5"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "e421abadd41a4225275504ea4d6566923418b7f05506fbc9c0fe86ba7396114b"
|
||||
|
||||
[[package]]
|
||||
name = "tungstenite"
|
||||
version = "0.23.0"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "6e2e2ce1e47ed2994fd43b04c8f618008d4cabdd5ee34027cf14f9d918edd9c8"
|
||||
dependencies = [
|
||||
"byteorder",
|
||||
"bytes",
|
||||
"log",
|
||||
"rand",
|
||||
"thiserror",
|
||||
"utf-8",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "typenum"
|
||||
version = "1.17.0"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "42ff0bf0c66b8238c6f3b578df37d0b7848e55df8577b3f74f92a69acceeb825"
|
||||
|
||||
[[package]]
|
||||
name = "ulid"
|
||||
version = "1.1.3"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "04f903f293d11f31c0c29e4148f6dc0d033a7f80cebc0282bea147611667d289"
|
||||
dependencies = [
|
||||
"getrandom",
|
||||
"rand",
|
||||
"web-time",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "unicase"
|
||||
version = "2.7.0"
|
||||
@ -2409,6 +2484,12 @@ dependencies = [
|
||||
"percent-encoding",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "utf-8"
|
||||
version = "0.7.6"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "09cc8ee72d2a9becf2f2febe0205bbed8fc6615b7cb429ad062dc7b7ddd036a9"
|
||||
|
||||
[[package]]
|
||||
name = "vcpkg"
|
||||
version = "0.2.15"
|
||||
@ -2526,6 +2607,16 @@ dependencies = [
|
||||
"wasm-bindgen",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "web-time"
|
||||
version = "1.1.0"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "5a6580f308b1fad9207618087a65c04e7a10bc77e02c8e84e9b00dd4b12fa0bb"
|
||||
dependencies = [
|
||||
"js-sys",
|
||||
"wasm-bindgen",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "windows-sys"
|
||||
version = "0.48.0"
|
||||
@ -2699,6 +2790,12 @@ version = "0.8.21"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "539a77ee7c0de333dcc6da69b177380a0b81e0dacfa4f7344c465a36871ee601"
|
||||
|
||||
[[package]]
|
||||
name = "xxhash-rust"
|
||||
version = "0.8.12"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "6a5cbf750400958819fb6178eaa83bee5cd9c29a26a40cc241df8c70fdd46984"
|
||||
|
||||
[[package]]
|
||||
name = "zerocopy"
|
||||
version = "0.7.35"
|
||||
|
@ -4,6 +4,7 @@ version = "0.1.0"
|
||||
edition = "2021"
|
||||
|
||||
[dependencies]
|
||||
anyhow = "1.0.86"
|
||||
ed25519-dalek = { version = "2.1.1", features = ["rand_core", "serde"] }
|
||||
futures = "0.3.30"
|
||||
hex = "0.4.3"
|
||||
@ -11,7 +12,7 @@ once_cell = "1.19.0"
|
||||
prost = "0.13.1"
|
||||
prost-types = "0.13.1"
|
||||
rand = "0.8.5"
|
||||
salvo = "0.70.0"
|
||||
salvo = { version = "0.70.0", features = ["affix"] }
|
||||
tabled = "0.16.0"
|
||||
tokio = { version = "1.39.2", features = ["macros"] }
|
||||
tonic = "0.12.1"
|
||||
|
@ -2,25 +2,14 @@ syntax = "proto3";
|
||||
package challenge;
|
||||
|
||||
import "google/protobuf/timestamp.proto";
|
||||
import "google/protobuf/empty.proto";
|
||||
|
||||
message NodeUpdate {
|
||||
string ip = 1;
|
||||
string keypair = 2;
|
||||
google.protobuf.Timestamp updated_at = 3;
|
||||
bool online = 4;
|
||||
}
|
||||
|
||||
service KeyDistribution {
|
||||
rpc UpdateKey (UpdateKeyReq) returns (google.protobuf.Empty);
|
||||
rpc UpdateNode (UpdateNodeReq) returns (google.protobuf.Empty);
|
||||
rpc RemoveNode (RemoveNodeReq) returns (google.protobuf.Empty);
|
||||
}
|
||||
|
||||
message UpdateKeyReq {
|
||||
string keypair = 1;
|
||||
google.protobuf.Timestamp updated_at = 2;
|
||||
}
|
||||
|
||||
message UpdateNodeReq {
|
||||
string keypair = 1;
|
||||
google.protobuf.Timestamp updated_at = 2;
|
||||
string ip = 3;
|
||||
}
|
||||
|
||||
message RemoveNodeReq {
|
||||
string ip = 1;
|
||||
rpc UpdateStreaming (stream NodeUpdate) returns (stream NodeUpdate);
|
||||
}
|
||||
|
141
src/database.rs
141
src/database.rs
@ -1,141 +0,0 @@
|
||||
#![allow(dead_code)]
|
||||
use ed25519_dalek::{Signer, SigningKey, VerifyingKey};
|
||||
use once_cell::sync::Lazy;
|
||||
use rand::rngs::OsRng;
|
||||
use std::collections::HashMap;
|
||||
use std::sync::Mutex;
|
||||
use std::thread;
|
||||
use std::time::Duration;
|
||||
use std::time::SystemTime;
|
||||
use tabled::{Table, Tabled};
|
||||
|
||||
pub enum SigningError {
|
||||
CorruptedKey,
|
||||
KeyNotFound,
|
||||
}
|
||||
|
||||
impl std::fmt::Display for SigningError {
|
||||
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
||||
let error_message = match self {
|
||||
SigningError::CorruptedKey => "The public key is corrupted",
|
||||
SigningError::KeyNotFound => "Did not find the public key",
|
||||
};
|
||||
write!(f, "{}", error_message)
|
||||
}
|
||||
}
|
||||
|
||||
impl From<hex::FromHexError> for SigningError {
|
||||
fn from(_: hex::FromHexError) -> Self {
|
||||
Self::CorruptedKey
|
||||
}
|
||||
}
|
||||
|
||||
impl From<ed25519_dalek::ed25519::Error> for SigningError {
|
||||
fn from(_: ed25519_dalek::ed25519::Error) -> Self {
|
||||
Self::CorruptedKey
|
||||
}
|
||||
}
|
||||
|
||||
impl From<std::array::TryFromSliceError> for SigningError {
|
||||
fn from(_: std::array::TryFromSliceError) -> Self {
|
||||
Self::CorruptedKey
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Clone)]
|
||||
pub struct NodeInfo {
|
||||
pub pubkey: VerifyingKey,
|
||||
pub updated_at: SystemTime,
|
||||
}
|
||||
|
||||
static NODES: Lazy<Mutex<HashMap<String, NodeInfo>>> = Lazy::new(|| Mutex::new(HashMap::new()));
|
||||
|
||||
static KEYS: Lazy<Mutex<HashMap<VerifyingKey, SigningKey>>> =
|
||||
Lazy::new(|| Mutex::new(HashMap::new()));
|
||||
|
||||
pub fn add_key(pubkey: VerifyingKey, privkey: SigningKey) {
|
||||
let mut keys = KEYS.lock().unwrap();
|
||||
keys.insert(pubkey, privkey);
|
||||
}
|
||||
|
||||
pub fn remove_key(pubkey: &VerifyingKey) {
|
||||
let mut keys = KEYS.lock().unwrap();
|
||||
keys.remove(pubkey);
|
||||
}
|
||||
|
||||
fn get_privkey(pubkey: &VerifyingKey) -> Option<SigningKey> {
|
||||
let keys = KEYS.lock().unwrap();
|
||||
keys.get(pubkey).cloned()
|
||||
}
|
||||
|
||||
pub fn sign_message_with_key(pubkey: &str, message: &str) -> Result<String, SigningError> {
|
||||
// Parse the hex string into a VerifyingKey
|
||||
let key_bytes = hex::decode(pubkey)?;
|
||||
let pubkey = VerifyingKey::from_bytes(&key_bytes.as_slice().try_into()?)?;
|
||||
|
||||
// Lock the hashmap and try to get the SigningKey
|
||||
let key_store = KEYS.lock().unwrap();
|
||||
let signing_key = match key_store.get(&pubkey) {
|
||||
Some(k) => k,
|
||||
None => return Err(SigningError::KeyNotFound),
|
||||
};
|
||||
|
||||
// TODO: check if to_bytes returns the signature in a format that people can verify from bash
|
||||
let signature = hex::encode(signing_key.sign(message.as_bytes()).to_bytes());
|
||||
|
||||
Ok(signature)
|
||||
}
|
||||
|
||||
pub fn add_node(ip: String, info: NodeInfo) {
|
||||
let mut nodes = NODES.lock().unwrap();
|
||||
nodes.insert(ip, info);
|
||||
}
|
||||
|
||||
pub fn remove_node(ip: &str) {
|
||||
let mut nodes = NODES.lock().unwrap();
|
||||
nodes.remove(ip);
|
||||
}
|
||||
|
||||
pub fn get_pubkey(ip: &str) -> Option<NodeInfo> {
|
||||
let nodes = NODES.lock().unwrap();
|
||||
nodes.get(ip).cloned()
|
||||
}
|
||||
|
||||
pub fn get_nodes_as_html_tabe() -> String {
|
||||
#[derive(Tabled)]
|
||||
struct OutputRow {
|
||||
ip: String,
|
||||
pubkey: String,
|
||||
age: u64,
|
||||
}
|
||||
let mut output = vec![];
|
||||
for (ip, node_info) in NODES.lock().unwrap().iter() {
|
||||
let ip = ip.clone();
|
||||
let pubkey = hex::encode(node_info.pubkey.as_bytes());
|
||||
let age = std::time::SystemTime::now()
|
||||
.duration_since(node_info.updated_at)
|
||||
.unwrap_or(Duration::ZERO)
|
||||
.as_secs();
|
||||
output.push(OutputRow { ip, pubkey, age });
|
||||
}
|
||||
Table::new(output).to_string()
|
||||
}
|
||||
|
||||
pub fn cycle_keys() {
|
||||
thread::spawn(|| {
|
||||
let mut csprng = OsRng;
|
||||
loop {
|
||||
// TODO: save old private key to disk using SGX Sealing
|
||||
let privkey = ed25519_dalek::SigningKey::generate(&mut csprng);
|
||||
add_node(
|
||||
"localhost".to_string(),
|
||||
NodeInfo {
|
||||
pubkey: privkey.verifying_key(),
|
||||
updated_at: std::time::SystemTime::now(),
|
||||
},
|
||||
);
|
||||
add_key(privkey.verifying_key(), privkey);
|
||||
thread::sleep(Duration::from_secs(60));
|
||||
}
|
||||
});
|
||||
}
|
218
src/datastore.rs
Normal file
218
src/datastore.rs
Normal file
@ -0,0 +1,218 @@
|
||||
#![allow(dead_code)]
|
||||
use ed25519_dalek::{Signer, SigningKey, VerifyingKey};
|
||||
use once_cell::sync::Lazy;
|
||||
use rand::rngs::OsRng;
|
||||
use std::collections::HashMap;
|
||||
use std::time::Duration;
|
||||
use std::time::SystemTime;
|
||||
use tabled::{Table, Tabled};
|
||||
use tokio::sync::Mutex;
|
||||
|
||||
type IP = String;
|
||||
|
||||
#[derive(Clone)]
|
||||
pub struct NodeInfo {
|
||||
pub pubkey: VerifyingKey,
|
||||
pub updated_at: SystemTime,
|
||||
pub online: bool,
|
||||
}
|
||||
|
||||
/// Needs to be surrounded in an Arc.
|
||||
pub struct Store {
|
||||
nodes: Mutex<HashMap<IP, NodeInfo>>,
|
||||
keys: Mutex<HashMap<VerifyingKey, SigningKey>>,
|
||||
}
|
||||
|
||||
impl Store {
|
||||
pub fn init() -> Self {
|
||||
Self {
|
||||
nodes: Mutex::new(HashMap::new()),
|
||||
keys: Mutex::new(HashMap::new()),
|
||||
}
|
||||
}
|
||||
|
||||
pub async fn add_mock_node(&self, ip: String) {
|
||||
let mut csprng = OsRng;
|
||||
let privkey = ed25519_dalek::SigningKey::generate(&mut csprng);
|
||||
{
|
||||
let mut nodes = self.nodes.lock().await;
|
||||
nodes.insert(
|
||||
ip,
|
||||
NodeInfo {
|
||||
pubkey: privkey.verifying_key(),
|
||||
updated_at: std::time::SystemTime::now(),
|
||||
online: true,
|
||||
},
|
||||
);
|
||||
}
|
||||
{
|
||||
let mut keys = self.keys.lock().await;
|
||||
keys.insert(privkey.verifying_key(), privkey);
|
||||
}
|
||||
}
|
||||
|
||||
pub async fn tabled_node_list(&self) -> String {
|
||||
#[derive(Tabled)]
|
||||
struct OutputRow {
|
||||
ip: String,
|
||||
pubkey: String,
|
||||
age: u64,
|
||||
}
|
||||
let mut output = vec![];
|
||||
for (ip, node_info) in self.nodes.lock().await.iter() {
|
||||
let ip = ip.clone();
|
||||
let pubkey = hex::encode(node_info.pubkey.as_bytes());
|
||||
let age = std::time::SystemTime::now()
|
||||
.duration_since(node_info.updated_at)
|
||||
.unwrap_or(Duration::ZERO)
|
||||
.as_secs();
|
||||
output.push(OutputRow { ip, pubkey, age });
|
||||
}
|
||||
Table::new(output).to_string()
|
||||
}
|
||||
|
||||
pub async fn sign_message_with_key(
|
||||
&self,
|
||||
message: &str,
|
||||
pubkey: &str,
|
||||
) -> Result<String, SigningError> {
|
||||
let key_bytes = hex::decode(pubkey)?;
|
||||
let pubkey = VerifyingKey::from_bytes(&key_bytes.as_slice().try_into()?)?;
|
||||
|
||||
let key_store = self.keys.lock().await;
|
||||
let signing_key = match { key_store.get(&pubkey) } {
|
||||
Some(k) => k,
|
||||
None => return Err(SigningError::KeyNotFound),
|
||||
};
|
||||
|
||||
// TODO: check if to_bytes returns the signature in a format that people can verify from bash
|
||||
let signature = hex::encode(signing_key.sign(message.as_bytes()).to_bytes());
|
||||
|
||||
Ok(signature)
|
||||
}
|
||||
}
|
||||
|
||||
static NODES: Lazy<Mutex<HashMap<String, NodeInfo>>> = Lazy::new(|| Mutex::new(HashMap::new()));
|
||||
|
||||
static KEYS: Lazy<Mutex<HashMap<VerifyingKey, SigningKey>>> =
|
||||
Lazy::new(|| Mutex::new(HashMap::new()));
|
||||
|
||||
pub enum SigningError {
|
||||
CorruptedKey,
|
||||
KeyNotFound,
|
||||
}
|
||||
|
||||
impl std::fmt::Display for SigningError {
|
||||
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
|
||||
let error_message = match self {
|
||||
SigningError::CorruptedKey => "The public key is corrupted",
|
||||
SigningError::KeyNotFound => "Did not find the public key",
|
||||
};
|
||||
write!(f, "{}", error_message)
|
||||
}
|
||||
}
|
||||
|
||||
impl From<hex::FromHexError> for SigningError {
|
||||
fn from(_: hex::FromHexError) -> Self {
|
||||
Self::CorruptedKey
|
||||
}
|
||||
}
|
||||
|
||||
impl From<ed25519_dalek::ed25519::Error> for SigningError {
|
||||
fn from(_: ed25519_dalek::ed25519::Error) -> Self {
|
||||
Self::CorruptedKey
|
||||
}
|
||||
}
|
||||
|
||||
impl From<std::array::TryFromSliceError> for SigningError {
|
||||
fn from(_: std::array::TryFromSliceError) -> Self {
|
||||
Self::CorruptedKey
|
||||
}
|
||||
}
|
||||
|
||||
pub async fn add_key(pubkey: VerifyingKey, privkey: SigningKey) {
|
||||
let mut keys = KEYS.lock().await;
|
||||
keys.insert(pubkey, privkey);
|
||||
}
|
||||
|
||||
pub async fn remove_key(pubkey: &VerifyingKey) {
|
||||
let mut keys = KEYS.lock().await;
|
||||
keys.remove(pubkey);
|
||||
}
|
||||
|
||||
async fn get_privkey(pubkey: &VerifyingKey) -> Option<SigningKey> {
|
||||
let keys = KEYS.lock().await;
|
||||
keys.get(pubkey).cloned()
|
||||
}
|
||||
|
||||
pub async fn sign_message_with_key(pubkey: &str, message: &str) -> Result<String, SigningError> {
|
||||
// Parse the hex string into a VerifyingKey
|
||||
let key_bytes = hex::decode(pubkey)?;
|
||||
let pubkey = VerifyingKey::from_bytes(&key_bytes.as_slice().try_into()?)?;
|
||||
|
||||
// Lock the hashmap and try to get the SigningKey
|
||||
let key_store = KEYS.lock().await;
|
||||
let signing_key = match key_store.get(&pubkey) {
|
||||
Some(k) => k,
|
||||
None => return Err(SigningError::KeyNotFound),
|
||||
};
|
||||
|
||||
// TODO: check if to_bytes returns the signature in a format that people can verify from bash
|
||||
let signature = hex::encode(signing_key.sign(message.as_bytes()).to_bytes());
|
||||
|
||||
Ok(signature)
|
||||
}
|
||||
|
||||
pub async fn add_node(ip: String, info: NodeInfo) {
|
||||
let mut nodes = NODES.lock().await;
|
||||
nodes.insert(ip, info);
|
||||
}
|
||||
|
||||
pub async fn remove_node(ip: &str) {
|
||||
let mut nodes = NODES.lock().await;
|
||||
nodes.remove(ip);
|
||||
}
|
||||
|
||||
pub async fn get_pubkey(ip: &str) -> Option<NodeInfo> {
|
||||
let nodes = NODES.lock().await;
|
||||
nodes.get(ip).cloned()
|
||||
}
|
||||
|
||||
pub async fn get_nodes_as_html_tabe() -> String {
|
||||
#[derive(Tabled)]
|
||||
struct OutputRow {
|
||||
ip: String,
|
||||
pubkey: String,
|
||||
age: u64,
|
||||
}
|
||||
let mut output = vec![];
|
||||
for (ip, node_info) in NODES.lock().await.iter() {
|
||||
let ip = ip.clone();
|
||||
let pubkey = hex::encode(node_info.pubkey.as_bytes());
|
||||
let age = std::time::SystemTime::now()
|
||||
.duration_since(node_info.updated_at)
|
||||
.unwrap_or(Duration::ZERO)
|
||||
.as_secs();
|
||||
output.push(OutputRow { ip, pubkey, age });
|
||||
}
|
||||
Table::new(output).to_string()
|
||||
}
|
||||
|
||||
// pub fn cycle_keys() {
|
||||
// thread::spawn(|| {
|
||||
// let mut csprng = OsRng;
|
||||
// loop {
|
||||
// // TODO: save old private key to disk using SGX Sealing
|
||||
// let privkey = ed25519_dalek::SigningKey::generate(&mut csprng);
|
||||
// add_node(
|
||||
// "localhost".to_string(),
|
||||
// NodeInfo {
|
||||
// pubkey: privkey.verifying_key(),
|
||||
// updated_at: std::time::SystemTime::now(),
|
||||
// },
|
||||
// );
|
||||
// add_key(privkey.verifying_key(), privkey);
|
||||
// thread::sleep(Duration::from_secs(60));
|
||||
// }
|
||||
// });
|
||||
// }
|
@ -1,13 +1,18 @@
|
||||
use crate::database::get_nodes_as_html_tabe;
|
||||
use crate::datastore::Store;
|
||||
use std::sync::Arc;
|
||||
|
||||
use salvo::prelude::*;
|
||||
use salvo::affix;
|
||||
|
||||
#[handler]
|
||||
async fn homepage() -> String {
|
||||
get_nodes_as_html_tabe()
|
||||
async fn homepage(depot: &mut Depot) -> String {
|
||||
let ds = depot.obtain::<Arc<Store>>().unwrap();
|
||||
ds.tabled_node_list().await
|
||||
}
|
||||
|
||||
#[handler]
|
||||
async fn sign(req: &mut Request) -> String {
|
||||
async fn sign(req: &mut Request, depot: &mut Depot) -> String {
|
||||
let ds = depot.obtain::<Arc<Store>>().unwrap();
|
||||
let pubkey = match req.query::<String>("pubkey") {
|
||||
Some(k) => k,
|
||||
None => return "pubkey must be specified as GET param".to_string(),
|
||||
@ -18,17 +23,22 @@ async fn sign(req: &mut Request) -> String {
|
||||
None => return "something must be specified as GET param".to_string(),
|
||||
};
|
||||
|
||||
match crate::database::sign_message_with_key(&pubkey, &something) {
|
||||
match ds.sign_message_with_key(&something, &pubkey).await {
|
||||
Ok(s) => s,
|
||||
Err(e) => e.to_string(),
|
||||
}
|
||||
}
|
||||
|
||||
pub async fn start() {
|
||||
let acceptor = TcpListener::new("0.0.0.0:31372").bind().await;
|
||||
let router = Router::new()
|
||||
.get(homepage)
|
||||
.push(Router::with_path("sign").get(sign));
|
||||
println!("{:?}", router);
|
||||
Server::new(acceptor).serve(router).await;
|
||||
pub fn init(ds: Arc<Store>) -> std::thread::JoinHandle<()> {
|
||||
std::thread::spawn(|| {
|
||||
tokio::runtime::Runtime::new().unwrap().block_on(async {
|
||||
let acceptor = TcpListener::new("0.0.0.0:31372").bind().await;
|
||||
let router = Router::new()
|
||||
.hoop(affix::inject(ds))
|
||||
.get(homepage)
|
||||
.push(Router::with_path("sign").get(sign));
|
||||
println!("{:?}", router);
|
||||
Server::new(acceptor).serve(router).await;
|
||||
});
|
||||
})
|
||||
}
|
||||
|
16
src/main.rs
16
src/main.rs
@ -1,12 +1,14 @@
|
||||
mod grpc;
|
||||
mod datastore;
|
||||
mod http_server;
|
||||
mod database;
|
||||
use crate::datastore::Store;
|
||||
use std::sync::Arc;
|
||||
|
||||
#[tokio::main]
|
||||
async fn main() {
|
||||
crate::database::cycle_keys();
|
||||
grpc::add_node("1.1.1.1".to_string());
|
||||
grpc::add_node("1.2.3.4".to_string());
|
||||
grpc::add_node("2.2.2.2".to_string());
|
||||
crate::http_server::start().await;
|
||||
let ds: Arc<Store> = Arc::new(Store::init());
|
||||
ds.add_mock_node("1.1.1.1".to_string()).await;
|
||||
ds.add_mock_node("1.2.3.4".to_string()).await;
|
||||
ds.add_mock_node("1.2.2.2".to_string()).await;
|
||||
let thread_result = crate::http_server::init(ds).join();
|
||||
println!("{thread_result:?}");
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user