mirror of https://github.com/certusone/dc4bc.git
355 lines
9.4 KiB
Go
355 lines
9.4 KiB
Go
package client
|
|
|
|
import (
|
|
"context"
|
|
"crypto/ed25519"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"log"
|
|
"path/filepath"
|
|
"sync"
|
|
"time"
|
|
|
|
sipf "github.com/depools/dc4bc/fsm/state_machines/signing_proposal_fsm"
|
|
|
|
"github.com/depools/dc4bc/client/types"
|
|
"github.com/depools/dc4bc/fsm/types/requests"
|
|
"github.com/google/uuid"
|
|
|
|
"github.com/depools/dc4bc/fsm/state_machines/signature_proposal_fsm"
|
|
spf "github.com/depools/dc4bc/fsm/state_machines/signature_proposal_fsm"
|
|
|
|
"github.com/depools/dc4bc/fsm/state_machines"
|
|
|
|
"github.com/depools/dc4bc/fsm/fsm"
|
|
dpf "github.com/depools/dc4bc/fsm/state_machines/dkg_proposal_fsm"
|
|
"github.com/depools/dc4bc/qr"
|
|
"github.com/depools/dc4bc/storage"
|
|
)
|
|
|
|
const (
|
|
pollingPeriod = time.Second
|
|
QrCodesDir = "/tmp"
|
|
)
|
|
|
|
type Poller interface {
|
|
GetUsername() string
|
|
GetPubKey() ed25519.PublicKey
|
|
Poll() error
|
|
SendMessage(message storage.Message) error
|
|
ProcessMessage(message storage.Message) error
|
|
GetOperations() (map[string]*types.Operation, error)
|
|
GetOperationQRPath(operationID string) ([]string, error)
|
|
StartHTTPServer(listenAddr string) error
|
|
GetLogger() *logger
|
|
}
|
|
|
|
type Client struct {
|
|
sync.Mutex
|
|
Logger *logger
|
|
userName string
|
|
pubKey ed25519.PublicKey
|
|
ctx context.Context
|
|
state State
|
|
storage storage.Storage
|
|
keyStore KeyStore
|
|
qrProcessor qr.Processor
|
|
}
|
|
|
|
func NewClient(
|
|
ctx context.Context,
|
|
userName string,
|
|
state State,
|
|
storage storage.Storage,
|
|
keyStore KeyStore,
|
|
qrProcessor qr.Processor,
|
|
) (Poller, error) {
|
|
keyPair, err := keyStore.LoadKeys(userName, "")
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to LoadKeys: %w", err)
|
|
}
|
|
|
|
return &Client{
|
|
ctx: ctx,
|
|
Logger: newLogger(userName),
|
|
userName: userName,
|
|
pubKey: keyPair.Pub,
|
|
state: state,
|
|
storage: storage,
|
|
keyStore: keyStore,
|
|
qrProcessor: qrProcessor,
|
|
}, nil
|
|
}
|
|
|
|
func (c *Client) GetLogger() *logger {
|
|
return c.Logger
|
|
}
|
|
|
|
func (c *Client) GetUsername() string {
|
|
return c.userName
|
|
}
|
|
|
|
func (c *Client) GetPubKey() ed25519.PublicKey {
|
|
return c.pubKey
|
|
}
|
|
|
|
func (c *Client) Poll() error {
|
|
tk := time.NewTicker(pollingPeriod)
|
|
for {
|
|
select {
|
|
case <-tk.C:
|
|
offset, err := c.state.LoadOffset()
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
messages, err := c.storage.GetMessages(offset)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to GetMessages: %w", err)
|
|
}
|
|
|
|
for _, message := range messages {
|
|
if message.RecipientAddr == "" || message.RecipientAddr == c.GetUsername() {
|
|
c.Logger.Log("Handling message with offset %d, type %s", message.Offset, message.Event)
|
|
if err := c.ProcessMessage(message); err != nil {
|
|
c.Logger.Log("Failed to process message with offset %d: %v", message.Offset, err)
|
|
} else {
|
|
c.Logger.Log("Successfully processed message with offset %d, type %s",
|
|
message.Offset, message.Event)
|
|
}
|
|
}
|
|
}
|
|
case <-c.ctx.Done():
|
|
log.Println("Context closed, stop polling...")
|
|
return nil
|
|
}
|
|
}
|
|
}
|
|
|
|
func (c *Client) SendMessage(message storage.Message) error {
|
|
if _, err := c.storage.Send(message); err != nil {
|
|
return fmt.Errorf("failed to post message: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (c *Client) ProcessMessage(message storage.Message) error {
|
|
fsmInstance, err := c.getFSMInstance(message.DkgRoundID)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to getFSMInstance: %w", err)
|
|
}
|
|
|
|
if fsm.Event(message.Event) != signature_proposal_fsm.EventInitProposal {
|
|
if err := c.verifyMessage(fsmInstance, message); err != nil {
|
|
return fmt.Errorf("failed to verifyMessage %+v: %w", message, err)
|
|
}
|
|
}
|
|
|
|
fsmReq, err := types.FSMRequestFromMessage(message)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to get FSMRequestFromMessage: %v", err)
|
|
}
|
|
|
|
resp, fsmDump, err := fsmInstance.Do(fsm.Event(message.Event), fsmReq)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to Do operation in FSM: %w", err)
|
|
}
|
|
|
|
c.Logger.Log("message %s done successfully from %s", message.Event, message.SenderAddr)
|
|
|
|
if resp.State == spf.StateSignatureProposalCollected {
|
|
fsmInstance, err = state_machines.FromDump(fsmDump)
|
|
if err != nil {
|
|
return fmt.Errorf("failed get state_machines from dump: %w", err)
|
|
}
|
|
resp, fsmDump, err = fsmInstance.Do(dpf.EventDKGInitProcess, requests.DefaultRequest{
|
|
CreatedAt: time.Now(),
|
|
})
|
|
if err != nil {
|
|
return fmt.Errorf("failed to Do operation in FSM: %w", err)
|
|
}
|
|
}
|
|
if resp.State == dpf.StateDkgMasterKeyCollected {
|
|
fsmInstance, err = state_machines.FromDump(fsmDump)
|
|
if err != nil {
|
|
return fmt.Errorf("failed get state_machines from dump: %w", err)
|
|
}
|
|
resp, fsmDump, err = fsmInstance.Do(sipf.EventSigningInit, requests.DefaultRequest{
|
|
CreatedAt: time.Now(),
|
|
})
|
|
if err != nil {
|
|
return fmt.Errorf("failed to Do operation in FSM: %w", err)
|
|
}
|
|
}
|
|
|
|
var operation *types.Operation
|
|
switch resp.State {
|
|
// if the new state is waiting for RPC to airgapped machine
|
|
case
|
|
spf.StateAwaitParticipantsConfirmations,
|
|
dpf.StateDkgCommitsAwaitConfirmations,
|
|
dpf.StateDkgDealsAwaitConfirmations,
|
|
dpf.StateDkgResponsesAwaitConfirmations,
|
|
dpf.StateDkgMasterKeyAwaitConfirmations,
|
|
sipf.StateSigningAwaitPartialSigns,
|
|
sipf.StateSigningPartialSignsCollected,
|
|
sipf.StateSigningAwaitConfirmations:
|
|
if resp.Data != nil {
|
|
bz, err := json.Marshal(resp.Data)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to marshal FSM response: %w", err)
|
|
}
|
|
|
|
operation = &types.Operation{
|
|
ID: uuid.New().String(),
|
|
Type: types.OperationType(resp.State),
|
|
Payload: bz,
|
|
DKGIdentifier: message.DkgRoundID,
|
|
CreatedAt: time.Now(),
|
|
}
|
|
}
|
|
default:
|
|
c.Logger.Log("State %s does not require an operation", resp.State)
|
|
}
|
|
|
|
if operation != nil {
|
|
if err := c.state.PutOperation(operation); err != nil {
|
|
return fmt.Errorf("failed to PutOperation: %w", err)
|
|
}
|
|
}
|
|
|
|
if err := c.state.SaveOffset(message.Offset + 1); err != nil {
|
|
return fmt.Errorf("failed to SaveOffset: %w", err)
|
|
}
|
|
|
|
if err := c.state.SaveFSM(message.DkgRoundID, fsmDump); err != nil {
|
|
return fmt.Errorf("failed to SaveFSM: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (c *Client) GetOperations() (map[string]*types.Operation, error) {
|
|
return c.state.GetOperations()
|
|
}
|
|
|
|
func (c *Client) getOperationJSON(operationID string) ([]byte, error) {
|
|
operation, err := c.state.GetOperationByID(operationID)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to get operation: %w", err)
|
|
}
|
|
|
|
operationJSON, err := json.Marshal(operation)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to marshal operation: %w", err)
|
|
}
|
|
return operationJSON, nil
|
|
}
|
|
|
|
// GetOperationQRPath returns a path to the image with the QR generated
|
|
// for the specified operation. It is supposed that the user will open
|
|
// this file herself.
|
|
func (c *Client) GetOperationQRPath(operationID string) ([]string, error) {
|
|
operationJSON, err := c.getOperationJSON(operationID)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to get operation in JSON: %w", err)
|
|
}
|
|
|
|
operationQRPath := filepath.Join(QrCodesDir, fmt.Sprintf("dc4bc_qr_%s", operationID))
|
|
chunks, err := qr.DataToChunks(operationJSON)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to divide a data on chunks: %w", err)
|
|
}
|
|
|
|
qrs := make([]string, 0, len(chunks))
|
|
|
|
for idx, chunk := range chunks {
|
|
qrPath := fmt.Sprintf("%s-%d", operationQRPath, idx)
|
|
if err = c.qrProcessor.WriteQR(qrPath, chunk); err != nil {
|
|
return nil, err
|
|
}
|
|
qrs = append(qrs, qrPath)
|
|
}
|
|
|
|
return qrs, nil
|
|
}
|
|
|
|
func (c *Client) handleProcessedOperation(operation types.Operation) error {
|
|
storedOperation, err := c.state.GetOperationByID(operation.ID)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to find matching operation: %w", err)
|
|
}
|
|
|
|
if err := storedOperation.Check(&operation); err != nil {
|
|
return fmt.Errorf("processed operation does not match stored operation: %w", err)
|
|
}
|
|
|
|
for _, message := range operation.ResultMsgs {
|
|
message.SenderAddr = c.GetUsername()
|
|
|
|
sig, err := c.signMessage(message.Bytes())
|
|
if err != nil {
|
|
return fmt.Errorf("failed to sign a message: %w", err)
|
|
}
|
|
message.Signature = sig
|
|
|
|
if _, err := c.storage.Send(message); err != nil {
|
|
return fmt.Errorf("failed to post message: %w", err)
|
|
}
|
|
}
|
|
|
|
if err := c.state.DeleteOperation(operation.ID); err != nil {
|
|
return fmt.Errorf("failed to DeleteOperation: %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (c *Client) getFSMInstance(dkgRoundID string) (*state_machines.FSMInstance, error) {
|
|
var err error
|
|
fsmInstance, ok, err := c.state.LoadFSM(dkgRoundID)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to LoadFSM: %w", err)
|
|
}
|
|
|
|
if !ok {
|
|
fsmInstance, err = state_machines.Create(dkgRoundID)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to create FSM instance: %w", err)
|
|
}
|
|
bz, err := fsmInstance.Dump()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to Dump FSM instance: %w", err)
|
|
}
|
|
if err := c.state.SaveFSM(dkgRoundID, bz); err != nil {
|
|
return nil, fmt.Errorf("failed to SaveFSM: %w", err)
|
|
}
|
|
}
|
|
|
|
return fsmInstance, nil
|
|
}
|
|
|
|
func (c *Client) signMessage(message []byte) ([]byte, error) {
|
|
keyPair, err := c.keyStore.LoadKeys(c.userName, "")
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to LoadKeys: %w", err)
|
|
}
|
|
|
|
return ed25519.Sign(keyPair.Priv, message), nil
|
|
}
|
|
|
|
func (c *Client) verifyMessage(fsmInstance *state_machines.FSMInstance, message storage.Message) error {
|
|
senderPubKey, err := fsmInstance.GetPubKeyByAddr(message.SenderAddr)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to GetPubKeyByAddr: %w", err)
|
|
}
|
|
|
|
if !ed25519.Verify(senderPubKey, message.Bytes(), message.Signature) {
|
|
return errors.New("signature is corrupt")
|
|
}
|
|
|
|
return nil
|
|
}
|