signing random messages from user

This commit is contained in:
ghe0 2024-08-15 02:11:58 +03:00
parent 701c2c6010
commit 60b26344d6
3 changed files with 79 additions and 6 deletions

@ -1,11 +1,44 @@
#![allow(dead_code)]
use ed25519_dalek::{SigningKey, VerifyingKey};
use ed25519_dalek::{Signer, SigningKey, VerifyingKey};
use once_cell::sync::Lazy;
use std::collections::HashMap;
use std::sync::Mutex;
use std::time::SystemTime;
use tabled::{Table, Tabled};
pub enum SigningError {
CorruptedKey,
KeyNotFound,
}
impl std::fmt::Display for SigningError {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
let error_message = match self {
SigningError::CorruptedKey => "The public key is corrupted",
SigningError::KeyNotFound => "Did not find the public key",
};
write!(f, "{}", error_message)
}
}
impl From<hex::FromHexError> for SigningError {
fn from(_: hex::FromHexError) -> Self {
Self::CorruptedKey
}
}
impl From<ed25519_dalek::ed25519::Error> for SigningError {
fn from(_: ed25519_dalek::ed25519::Error) -> Self {
Self::CorruptedKey
}
}
impl From<std::array::TryFromSliceError> for SigningError {
fn from(_: std::array::TryFromSliceError) -> Self {
Self::CorruptedKey
}
}
#[derive(Clone)]
pub struct NodeInfo {
pub pubkey: VerifyingKey,
@ -27,11 +60,29 @@ pub fn remove_key(pubkey: &VerifyingKey) {
keys.remove(pubkey);
}
pub fn get_privkey(pubkey: &VerifyingKey) -> Option<SigningKey> {
fn get_privkey(pubkey: &VerifyingKey) -> Option<SigningKey> {
let keys = KEYS.lock().unwrap();
keys.get(pubkey).cloned()
}
pub fn sign_message_with_key(pubkey: &str, message: &str) -> Result<String, SigningError> {
// Parse the hex string into a VerifyingKey
let key_bytes = hex::decode(pubkey)?;
let pubkey = VerifyingKey::from_bytes(&key_bytes.as_slice().try_into()?)?;
// Lock the hashmap and try to get the SigningKey
let key_store = KEYS.lock().unwrap();
let signing_key = match key_store.get(&pubkey) {
Some(k) => k,
None => return Err(SigningError::KeyNotFound),
};
// TODO: check if to_bytes returns the signature in a format that people can verify from bash
let signature = hex::encode(signing_key.sign(message.as_bytes()).to_bytes());
Ok(signature)
}
pub fn add_node(ip: String, info: NodeInfo) {
let mut nodes = NODES.lock().unwrap();
nodes.insert(ip, info);

@ -4,11 +4,13 @@ use rand::rngs::OsRng;
pub fn add_node(ip: String) {
let mut csprng = OsRng;
let privkey = ed25519_dalek::SigningKey::generate(&mut csprng);
database::add_node(
ip,
NodeInfo {
pubkey: ed25519_dalek::SigningKey::generate(&mut csprng).verifying_key(),
pubkey: privkey.verifying_key(),
updated_at: std::time::SystemTime::now(),
},
)
);
database::add_key(privkey.verifying_key(), privkey);
}

@ -1,14 +1,34 @@
use salvo::prelude::*;
use crate::database::get_nodes_as_html_tabe;
use salvo::prelude::*;
#[handler]
async fn homepage() -> String {
get_nodes_as_html_tabe()
}
#[handler]
async fn sign(req: &mut Request) -> String {
let pubkey = match req.query::<String>("pubkey") {
Some(k) => k,
None => return "pubkey must be specified as GET param".to_string(),
};
let something = match req.query::<String>("something") {
Some(k) => k,
None => return "something must be specified as GET param".to_string(),
};
match crate::database::sign_message_with_key(&pubkey, &something) {
Ok(s) => s,
Err(e) => e.to_string(),
}
}
pub async fn start() {
let acceptor = TcpListener::new("0.0.0.0:5800").bind().await;
let router = Router::new().get(homepage);
let router = Router::new()
.get(homepage)
.push(Router::with_path("sign").get(sign));
println!("{:?}", router);
Server::new(acceptor).serve(router).await;
}