2023-05-11 11:11:57 -04:00
|
|
|
use hyper::{body::Bytes, header::HeaderValue, Body, Response};
|
2023-04-04 19:34:35 -04:00
|
|
|
|
2023-06-23 08:19:19 -04:00
|
|
|
use lox_library::{
|
2023-06-20 20:04:17 -04:00
|
|
|
bridge_table::{BridgeLine, EncryptedBucket, MAX_BRIDGES_PER_BUCKET},
|
2023-04-04 19:34:35 -04:00
|
|
|
proto::{
|
|
|
|
blockage_migration, check_blockage, issue_invite, level_up, migration, open_invite,
|
|
|
|
redeem_invite, trust_promotion,
|
|
|
|
},
|
2023-06-06 20:27:49 -04:00
|
|
|
BridgeAuth, BridgeDb, IssuerPubKey,
|
2023-04-04 19:34:35 -04:00
|
|
|
};
|
2023-07-20 14:25:25 -04:00
|
|
|
use serde::{Deserialize, Serialize};
|
|
|
|
|
2023-07-19 10:37:09 -04:00
|
|
|
use std::{
|
|
|
|
collections::HashMap,
|
|
|
|
sync::{Arc, Mutex},
|
|
|
|
};
|
2023-06-13 12:03:06 -04:00
|
|
|
use zkp::ProofError;
|
2023-04-04 19:34:35 -04:00
|
|
|
|
2023-08-01 15:09:46 -04:00
|
|
|
#[derive(Clone, Debug, Serialize, Deserialize)]
|
2023-04-04 19:34:35 -04:00
|
|
|
pub struct LoxServerContext {
|
|
|
|
pub db: Arc<Mutex<BridgeDb>>,
|
|
|
|
pub ba: Arc<Mutex<BridgeAuth>>,
|
2023-04-05 16:26:23 -04:00
|
|
|
pub extra_bridges: Arc<Mutex<Vec<BridgeLine>>>,
|
2023-07-20 14:25:25 -04:00
|
|
|
pub to_be_replaced_bridges: Arc<Mutex<Vec<BridgeLine>>>,
|
2023-04-04 19:34:35 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
impl LoxServerContext {
|
2023-09-13 12:08:48 -04:00
|
|
|
pub fn bridgetable_is_empty(&self) -> bool {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
ba_obj.is_empty()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Populate an empty bridgetable for the first time
|
2023-08-28 14:14:41 -04:00
|
|
|
pub fn populate_bridgetable(
|
|
|
|
&self,
|
|
|
|
buckets: Vec<[BridgeLine; MAX_BRIDGES_PER_BUCKET]>,
|
|
|
|
percent_spares: i32,
|
|
|
|
) {
|
|
|
|
let mut partition: i32 = 0;
|
|
|
|
if percent_spares != 0 {
|
|
|
|
partition = buckets.len() as i32 * percent_spares / 100;
|
|
|
|
}
|
|
|
|
let (spares, open_invitations) = buckets.split_at(partition as usize);
|
|
|
|
for bucket in spares {
|
|
|
|
self.add_spare_bucket(*bucket)
|
2023-09-13 12:08:48 -04:00
|
|
|
}
|
|
|
|
|
2023-08-28 14:14:41 -04:00
|
|
|
for bucket in open_invitations {
|
|
|
|
self.add_openinv_bucket(*bucket)
|
|
|
|
}
|
|
|
|
}
|
2023-09-13 12:08:48 -04:00
|
|
|
|
2023-08-28 19:33:19 -04:00
|
|
|
/* Functionality for marking bridges as unreachable/blocked is currently not enabled as there is not
|
|
|
|
yet a reliable way to determine that a bridge is blocked. This means that migrations to unblocked bridges do not
|
|
|
|
currently work but can be easily enabled with a list of `blocked resources` from rdsys or another source with something
|
|
|
|
like the following:
|
|
|
|
println!("BridgeLine to be removed: {:?}", bridgeline);
|
|
|
|
let res = context.add_unreachable(bridgeline);
|
|
|
|
if res {
|
|
|
|
println!(
|
|
|
|
"BridgeLine successfully marked unreachable: {:?}",
|
|
|
|
bridgeline
|
|
|
|
);
|
|
|
|
} else {
|
|
|
|
println!("'Gone' BridgeLine NOT REMOVED!! : {:?}", bridgeline);
|
|
|
|
//TODO probably do something else here
|
|
|
|
}
|
|
|
|
*/
|
|
|
|
|
|
|
|
// Sync resources received from rdsys with the Lox bridgetable
|
|
|
|
pub fn sync_with_bridgetable(&self, functional: Vec<BridgeLine>, failing: Vec<BridgeLine>) {
|
|
|
|
// Check if the resource is already in the Lox bridgetable. If it is, it's probably fine
|
|
|
|
// to replace the existing resource with the incoming one to account for changes,
|
|
|
|
// unless we want to track the number of changes on the lox side?
|
|
|
|
for bridge in functional {
|
|
|
|
let res = self.update_bridge(bridge);
|
|
|
|
if res {
|
|
|
|
println!(
|
|
|
|
"BridgeLine {:?} successfully updated.",
|
|
|
|
bridge.uid_fingerprint
|
|
|
|
);
|
|
|
|
// Assume non-failing bridges that are not found in the bridge table are new bridges and save them for later
|
|
|
|
} else {
|
|
|
|
println!("BridgeLine: {:?} not found in Lox's Bridgetable. Save it as a new resource for now!", bridge.uid_fingerprint);
|
|
|
|
self.append_extra_bridges(bridge);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Next, handle the failing bridges. If resource last passed tests 3 hours ago, it should be replaced
|
|
|
|
// with a working resource and be removed from the bridgetable.
|
|
|
|
for bridge in failing {
|
|
|
|
let res = self.replace_with_new(bridge);
|
|
|
|
if res == lox_library::ReplaceSuccess::Replaced {
|
|
|
|
println!(
|
|
|
|
"BridgeLine {:?} successfully replaced.",
|
|
|
|
bridge.uid_fingerprint
|
|
|
|
);
|
|
|
|
} else if res == lox_library::ReplaceSuccess::NotReplaced {
|
|
|
|
// Add the bridge to the list of to_be_replaced bridges in the Lox context and try
|
|
|
|
// again to replace at the next update (nothing changes in the Lox Authority)
|
|
|
|
println!(
|
|
|
|
"BridgeLine {:?} NOT replaced, saved for next update!",
|
|
|
|
bridge.uid_fingerprint
|
|
|
|
);
|
|
|
|
self.new_to_be_replaced_bridge(bridge);
|
|
|
|
} else {
|
|
|
|
// NotFound
|
|
|
|
assert!(
|
|
|
|
res == lox_library::ReplaceSuccess::NotFound,
|
|
|
|
"ReplaceSuccess incorrectly set"
|
|
|
|
);
|
|
|
|
println!(
|
|
|
|
"BridgeLine {:?} no longer in bridge table.",
|
|
|
|
bridge.uid_fingerprint
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Finally, assign any extra_bridges to new buckets if there are enough
|
|
|
|
while self.extra_bridges.lock().unwrap().len() >= MAX_BRIDGES_PER_BUCKET {
|
|
|
|
let bucket = self.remove_extra_bridges();
|
|
|
|
// TODO: Decide the circumstances under which a bridge is allocated to an open_inv or spare bucket,
|
|
|
|
// eventually also do some more fancy grouping of new resources, i.e., by type or region
|
|
|
|
self.add_spare_bucket(bucket);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-05-11 11:11:57 -04:00
|
|
|
pub fn append_extra_bridges(&self, bridge: BridgeLine) {
|
2023-04-05 16:26:23 -04:00
|
|
|
let mut extra_bridges = self.extra_bridges.lock().unwrap();
|
|
|
|
extra_bridges.push(bridge);
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn remove_extra_bridges(&self) -> [BridgeLine; MAX_BRIDGES_PER_BUCKET] {
|
|
|
|
let mut extra_bridges = self.extra_bridges.lock().unwrap();
|
2023-04-10 12:16:19 -04:00
|
|
|
let mut return_bridges = [BridgeLine::default(); MAX_BRIDGES_PER_BUCKET];
|
2023-06-16 12:27:40 -04:00
|
|
|
for bridge in return_bridges.iter_mut() {
|
|
|
|
if let Some(extra) = extra_bridges.pop() {
|
|
|
|
*bridge = extra
|
|
|
|
}
|
2023-04-10 12:16:19 -04:00
|
|
|
}
|
|
|
|
return_bridges
|
2023-04-05 16:26:23 -04:00
|
|
|
}
|
|
|
|
|
2023-05-17 12:46:09 -04:00
|
|
|
pub fn remove_single_bridge(&self) {
|
|
|
|
let mut extra_bridges = self.extra_bridges.lock().unwrap();
|
|
|
|
let length = extra_bridges.len();
|
|
|
|
_ = extra_bridges.remove(length - 1)
|
|
|
|
}
|
|
|
|
|
2023-07-20 14:25:25 -04:00
|
|
|
pub fn new_to_be_replaced_bridge(&self, bridge: BridgeLine) {
|
|
|
|
let mut to_be_replaced_bridges = self.to_be_replaced_bridges.lock().unwrap();
|
|
|
|
to_be_replaced_bridges.push(bridge);
|
2023-05-11 11:07:42 -04:00
|
|
|
}
|
|
|
|
|
2023-05-08 20:30:30 -04:00
|
|
|
pub fn allocate_leftover_bridges(&self) {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
let mut db_obj = self.db.lock().unwrap();
|
|
|
|
let mut extra_bridges = self.extra_bridges.lock().unwrap();
|
|
|
|
ba_obj.allocate_bridges(&mut extra_bridges, &mut db_obj);
|
|
|
|
}
|
|
|
|
|
2023-04-04 19:34:35 -04:00
|
|
|
pub fn add_openinv_bucket(&self, bucket: [BridgeLine; 3]) {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
let mut db_obj = self.db.lock().unwrap();
|
2023-07-27 16:05:20 -04:00
|
|
|
match ba_obj.add_openinv_bridges(bucket, &mut db_obj) {
|
|
|
|
Ok(_) => (),
|
|
|
|
Err(e) => {
|
|
|
|
println!("Error: {:?}", e);
|
|
|
|
for bridge in bucket {
|
|
|
|
self.append_extra_bridges(bridge);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2023-04-04 19:34:35 -04:00
|
|
|
}
|
|
|
|
|
2023-04-05 16:26:23 -04:00
|
|
|
pub fn add_spare_bucket(&self, bucket: [BridgeLine; 3]) {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
2023-07-13 17:36:40 -04:00
|
|
|
let mut db_obj = self.db.lock().unwrap();
|
2023-07-27 16:05:20 -04:00
|
|
|
match ba_obj.add_spare_bucket(bucket, &mut db_obj) {
|
|
|
|
Ok(_) => (),
|
|
|
|
Err(e) => {
|
|
|
|
println!("Error: {:?}", e);
|
|
|
|
for bridge in bucket {
|
|
|
|
self.append_extra_bridges(bridge);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2023-04-05 16:26:23 -04:00
|
|
|
}
|
|
|
|
|
2023-08-28 19:33:19 -04:00
|
|
|
// Attempt to remove a bridge that is failing tests and replace it with a bridge from the
|
|
|
|
// available bridges or from a spare bucket
|
2023-06-23 08:19:19 -04:00
|
|
|
pub fn replace_with_new(&self, bridgeline: BridgeLine) -> lox_library::ReplaceSuccess {
|
2023-05-03 20:11:10 -04:00
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
2023-05-17 12:46:09 -04:00
|
|
|
let eb_obj = self.extra_bridges.lock().unwrap();
|
|
|
|
let available_bridge = eb_obj.last();
|
2023-06-16 13:56:30 -04:00
|
|
|
let result = ba_obj.bridge_replace(&bridgeline, available_bridge);
|
|
|
|
// .last() doesn't actually remove the object so we still have to do that if the bridge was
|
|
|
|
// replaced with an available bridge
|
2023-06-23 08:19:19 -04:00
|
|
|
if result == lox_library::ReplaceSuccess::Replaced && eb_obj.len() > 0 {
|
2023-05-17 12:46:09 -04:00
|
|
|
self.remove_single_bridge();
|
|
|
|
}
|
2023-06-16 13:56:30 -04:00
|
|
|
result
|
2023-05-03 20:11:10 -04:00
|
|
|
}
|
2023-05-11 11:11:57 -04:00
|
|
|
|
2023-07-19 10:37:09 -04:00
|
|
|
/* Uncomment when bridge blocking is finalized
|
|
|
|
pub fn add_unreachable(&self, bridgeline: BridgeLine) -> bool {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
let mut db_obj = self.db.lock().unwrap();
|
|
|
|
ba_obj.bridge_unreachable(&bridgeline, &mut db_obj)
|
|
|
|
}
|
|
|
|
*/
|
2023-04-04 19:34:35 -04:00
|
|
|
|
|
|
|
pub fn update_bridge(&self, bridgeline: BridgeLine) -> bool {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
ba_obj.bridge_update(&bridgeline)
|
|
|
|
}
|
|
|
|
|
2023-06-06 20:27:49 -04:00
|
|
|
#[cfg(test)]
|
|
|
|
/// For testing only: manually advance the day by the given number
|
|
|
|
/// of days.
|
2023-06-12 13:16:24 -04:00
|
|
|
pub fn advance_days_test(&self, num: u16) {
|
2023-04-04 19:34:35 -04:00
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
ba_obj.advance_days(num); // FOR TESTING ONLY
|
|
|
|
println!("Today's date according to server: {}", ba_obj.today());
|
|
|
|
}
|
|
|
|
|
2023-06-20 20:04:17 -04:00
|
|
|
pub fn encrypt_table(&self) -> HashMap<u32, EncryptedBucket> {
|
2023-04-04 19:34:35 -04:00
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
ba_obj.enc_bridge_table().clone()
|
|
|
|
}
|
|
|
|
|
|
|
|
fn pubkeys(&self) -> Vec<IssuerPubKey> {
|
|
|
|
let ba_obj = self.ba.lock().unwrap();
|
|
|
|
// vector of public keys (to serialize)
|
|
|
|
vec![
|
|
|
|
ba_obj.lox_pub.clone(),
|
|
|
|
ba_obj.migration_pub.clone(),
|
|
|
|
ba_obj.migrationkey_pub.clone(),
|
|
|
|
ba_obj.reachability_pub.clone(),
|
|
|
|
ba_obj.invitation_pub.clone(),
|
|
|
|
]
|
|
|
|
}
|
|
|
|
|
2023-06-06 20:27:49 -04:00
|
|
|
fn gen_invite(&self) -> lox_utils::Invite {
|
2023-07-25 17:24:03 -04:00
|
|
|
let mut obj = self.db.lock().unwrap();
|
2023-06-06 20:27:49 -04:00
|
|
|
lox_utils::Invite {
|
2023-04-04 19:34:35 -04:00
|
|
|
invite: obj.invite(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-06-13 12:03:06 -04:00
|
|
|
fn open_inv(&self, req: open_invite::Request) -> Result<open_invite::Response, ProofError> {
|
2023-04-04 19:34:35 -04:00
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
2023-06-13 12:03:06 -04:00
|
|
|
ba_obj.handle_open_invite(req)
|
2023-04-04 19:34:35 -04:00
|
|
|
}
|
|
|
|
|
2023-06-13 12:03:06 -04:00
|
|
|
fn trust_promo(
|
|
|
|
&self,
|
|
|
|
req: trust_promotion::Request,
|
|
|
|
) -> Result<trust_promotion::Response, ProofError> {
|
2023-04-04 19:34:35 -04:00
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
2023-06-13 12:03:06 -04:00
|
|
|
ba_obj.handle_trust_promotion(req)
|
2023-04-04 19:34:35 -04:00
|
|
|
}
|
|
|
|
|
2023-06-13 12:03:06 -04:00
|
|
|
fn trust_migration(&self, req: migration::Request) -> Result<migration::Response, ProofError> {
|
2023-04-04 19:34:35 -04:00
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
2023-06-13 12:03:06 -04:00
|
|
|
ba_obj.handle_migration(req)
|
2023-04-04 19:34:35 -04:00
|
|
|
}
|
|
|
|
|
2023-06-13 12:03:06 -04:00
|
|
|
fn level_up(&self, req: level_up::Request) -> Result<level_up::Response, ProofError> {
|
2023-04-04 19:34:35 -04:00
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
2023-06-13 12:03:06 -04:00
|
|
|
ba_obj.handle_level_up(req)
|
2023-04-04 19:34:35 -04:00
|
|
|
}
|
|
|
|
|
2023-06-13 12:03:06 -04:00
|
|
|
fn issue_invite(
|
|
|
|
&self,
|
|
|
|
req: issue_invite::Request,
|
|
|
|
) -> Result<issue_invite::Response, ProofError> {
|
2023-04-04 19:34:35 -04:00
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
2023-06-13 12:03:06 -04:00
|
|
|
ba_obj.handle_issue_invite(req)
|
2023-04-04 19:34:35 -04:00
|
|
|
}
|
|
|
|
|
2023-06-13 12:03:06 -04:00
|
|
|
fn redeem_invite(
|
|
|
|
&self,
|
|
|
|
req: redeem_invite::Request,
|
|
|
|
) -> Result<redeem_invite::Response, ProofError> {
|
2023-04-04 19:34:35 -04:00
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
2023-06-13 12:03:06 -04:00
|
|
|
ba_obj.handle_redeem_invite(req)
|
2023-04-04 19:34:35 -04:00
|
|
|
}
|
|
|
|
|
2023-06-13 12:03:06 -04:00
|
|
|
fn check_blockage(
|
|
|
|
&self,
|
|
|
|
req: check_blockage::Request,
|
|
|
|
) -> Result<check_blockage::Response, ProofError> {
|
2023-04-04 19:34:35 -04:00
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
2023-06-13 12:03:06 -04:00
|
|
|
ba_obj.handle_check_blockage(req)
|
2023-04-04 19:34:35 -04:00
|
|
|
}
|
|
|
|
|
2023-06-13 12:03:06 -04:00
|
|
|
fn blockage_migration(
|
|
|
|
&self,
|
|
|
|
req: blockage_migration::Request,
|
|
|
|
) -> Result<blockage_migration::Response, ProofError> {
|
2023-04-04 19:34:35 -04:00
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
2023-06-13 12:03:06 -04:00
|
|
|
ba_obj.handle_blockage_migration(req)
|
2023-04-04 19:34:35 -04:00
|
|
|
}
|
|
|
|
|
2023-08-30 18:40:38 -04:00
|
|
|
// Generate and return an open invitation token
|
|
|
|
pub fn generate_invite(self) -> Response<Body> {
|
|
|
|
let invite = self.gen_invite();
|
|
|
|
match serde_json::to_string(&invite) {
|
|
|
|
Ok(resp) => prepare_header(resp),
|
|
|
|
Err(e) => {
|
|
|
|
println!("Error parsing Invite to JSON");
|
|
|
|
prepare_error_header(e.to_string())
|
|
|
|
}
|
2023-06-13 12:03:06 -04:00
|
|
|
}
|
|
|
|
}
|
2023-04-04 19:34:35 -04:00
|
|
|
|
2023-08-30 18:40:38 -04:00
|
|
|
// Return the serialized encrypted bridge table
|
|
|
|
pub fn send_reachability_cred(self) -> Response<Body> {
|
|
|
|
let enc_table = self.encrypt_table();
|
|
|
|
let etable = lox_utils::EncBridgeTable { etable: enc_table };
|
|
|
|
match serde_json::to_string(&etable) {
|
|
|
|
Ok(resp) => prepare_header(resp),
|
|
|
|
Err(e) => {
|
|
|
|
println!("Error parsing encrypted bridgetable to JSON");
|
|
|
|
prepare_error_header(e.to_string())
|
|
|
|
}
|
2023-06-13 12:03:06 -04:00
|
|
|
}
|
|
|
|
}
|
2023-04-04 19:34:35 -04:00
|
|
|
|
2023-08-30 18:40:38 -04:00
|
|
|
// Return the serialized pubkeys for the Bridge Authority
|
|
|
|
pub fn send_keys(self) -> Response<Body> {
|
|
|
|
let pubkeys = self.pubkeys();
|
|
|
|
match serde_json::to_string(&pubkeys) {
|
|
|
|
Ok(resp) => prepare_header(resp),
|
|
|
|
Err(e) => {
|
|
|
|
println!("Error parsing Pubkeys to JSON");
|
|
|
|
prepare_error_header(e.to_string())
|
|
|
|
}
|
2023-06-13 12:03:06 -04:00
|
|
|
}
|
|
|
|
}
|
2023-04-04 19:34:35 -04:00
|
|
|
|
2023-08-30 18:40:38 -04:00
|
|
|
pub fn verify_and_send_open_cred(self, request: Bytes) -> Response<Body> {
|
|
|
|
let req = match serde_json::from_slice(&request) {
|
|
|
|
Ok(req) => req,
|
|
|
|
Err(e) => return prepare_error_header(e.to_string()),
|
|
|
|
};
|
|
|
|
match self.open_inv(req) {
|
|
|
|
Ok(resp) => {
|
|
|
|
let response = serde_json::to_string(&resp).unwrap();
|
|
|
|
prepare_header(response)
|
|
|
|
}
|
|
|
|
Err(e) => {
|
|
|
|
println!("Invalid Open Invitation request, Proof Error");
|
|
|
|
prepare_error_header(e.to_string())
|
|
|
|
}
|
2023-06-13 12:03:06 -04:00
|
|
|
}
|
|
|
|
}
|
2023-04-04 19:34:35 -04:00
|
|
|
|
2023-08-30 18:40:38 -04:00
|
|
|
pub fn verify_and_send_trust_promo(self, request: Bytes) -> Response<Body> {
|
|
|
|
let req: trust_promotion::Request = match serde_json::from_slice(&request) {
|
|
|
|
Ok(req) => req,
|
|
|
|
Err(e) => return prepare_error_header(e.to_string()),
|
|
|
|
};
|
|
|
|
match self.trust_promo(req) {
|
|
|
|
Ok(resp) => {
|
|
|
|
let response = serde_json::to_string(&resp).unwrap();
|
|
|
|
prepare_header(response)
|
|
|
|
}
|
|
|
|
Err(e) => {
|
|
|
|
println!("Invalid Trust Promotion request, Proof Error");
|
|
|
|
prepare_error_header(e.to_string())
|
|
|
|
}
|
2023-06-13 12:03:06 -04:00
|
|
|
}
|
|
|
|
}
|
2023-04-04 19:34:35 -04:00
|
|
|
|
2023-08-30 18:40:38 -04:00
|
|
|
pub fn verify_and_send_trust_migration(self, request: Bytes) -> Response<Body> {
|
|
|
|
let req: migration::Request = match serde_json::from_slice(&request) {
|
|
|
|
Ok(req) => req,
|
|
|
|
Err(e) => return prepare_error_header(e.to_string()),
|
|
|
|
};
|
|
|
|
match self.trust_migration(req) {
|
|
|
|
Ok(resp) => {
|
|
|
|
let response = serde_json::to_string(&resp).unwrap();
|
|
|
|
prepare_header(response)
|
|
|
|
}
|
|
|
|
Err(e) => {
|
|
|
|
println!("Invalid Trust Migration request, Proof Error");
|
|
|
|
prepare_error_header(e.to_string())
|
|
|
|
}
|
2023-06-13 12:03:06 -04:00
|
|
|
}
|
|
|
|
}
|
2023-04-04 19:34:35 -04:00
|
|
|
|
2023-08-30 18:40:38 -04:00
|
|
|
pub fn verify_and_send_level_up(self, request: Bytes) -> Response<Body> {
|
|
|
|
let req: level_up::Request = match serde_json::from_slice(&request) {
|
|
|
|
Ok(req) => req,
|
|
|
|
Err(e) => return prepare_error_header(e.to_string()),
|
|
|
|
};
|
|
|
|
match self.level_up(req) {
|
|
|
|
Ok(resp) => {
|
|
|
|
let response = serde_json::to_string(&resp).unwrap();
|
|
|
|
prepare_header(response)
|
|
|
|
}
|
|
|
|
Err(e) => {
|
|
|
|
println!("Invalid Level up request, Proof Error");
|
|
|
|
prepare_error_header(e.to_string())
|
|
|
|
}
|
2023-06-13 12:03:06 -04:00
|
|
|
}
|
|
|
|
}
|
2023-04-04 19:34:35 -04:00
|
|
|
|
2023-08-30 18:40:38 -04:00
|
|
|
pub fn verify_and_send_issue_invite(self, request: Bytes) -> Response<Body> {
|
|
|
|
let req: issue_invite::Request = match serde_json::from_slice(&request) {
|
|
|
|
Ok(req) => req,
|
|
|
|
Err(e) => return prepare_error_header(e.to_string()),
|
|
|
|
};
|
|
|
|
match self.issue_invite(req) {
|
|
|
|
Ok(resp) => {
|
|
|
|
let response = serde_json::to_string(&resp).unwrap();
|
|
|
|
prepare_header(response)
|
|
|
|
}
|
|
|
|
Err(e) => {
|
|
|
|
println!("Invalid Issue invite request, Proof Error");
|
|
|
|
prepare_error_header(e.to_string())
|
|
|
|
}
|
2023-06-13 12:03:06 -04:00
|
|
|
}
|
|
|
|
}
|
2023-04-04 19:34:35 -04:00
|
|
|
|
2023-08-30 18:40:38 -04:00
|
|
|
pub fn verify_and_send_redeem_invite(self, request: Bytes) -> Response<Body> {
|
|
|
|
let req: redeem_invite::Request = match serde_json::from_slice(&request) {
|
|
|
|
Ok(req) => req,
|
|
|
|
Err(e) => return prepare_error_header(e.to_string()),
|
|
|
|
};
|
|
|
|
match self.redeem_invite(req) {
|
|
|
|
Ok(resp) => {
|
|
|
|
let response = serde_json::to_string(&resp).unwrap();
|
|
|
|
prepare_header(response)
|
|
|
|
}
|
|
|
|
Err(e) => {
|
|
|
|
println!("Invalid Redeem Invite request, Proof Error");
|
|
|
|
prepare_error_header(e.to_string())
|
|
|
|
}
|
2023-06-13 12:03:06 -04:00
|
|
|
}
|
|
|
|
}
|
2023-04-04 19:34:35 -04:00
|
|
|
|
2023-08-30 18:40:38 -04:00
|
|
|
pub fn verify_and_send_check_blockage(self, request: Bytes) -> Response<Body> {
|
|
|
|
let req: check_blockage::Request = match serde_json::from_slice(&request) {
|
|
|
|
Ok(req) => req,
|
|
|
|
Err(e) => return prepare_error_header(e.to_string()),
|
|
|
|
};
|
|
|
|
match self.check_blockage(req) {
|
|
|
|
Ok(resp) => {
|
|
|
|
let response = serde_json::to_string(&resp).unwrap();
|
|
|
|
prepare_header(response)
|
|
|
|
}
|
|
|
|
Err(e) => {
|
|
|
|
println!("Invalid Check blockage request, Proof Error");
|
|
|
|
prepare_error_header(e.to_string())
|
|
|
|
}
|
2023-06-13 12:03:06 -04:00
|
|
|
}
|
|
|
|
}
|
2023-04-04 19:34:35 -04:00
|
|
|
|
2023-08-30 18:40:38 -04:00
|
|
|
pub fn verify_and_send_blockage_migration(self, request: Bytes) -> Response<Body> {
|
|
|
|
let req: blockage_migration::Request = match serde_json::from_slice(&request) {
|
|
|
|
Ok(req) => req,
|
|
|
|
Err(e) => return prepare_error_header(e.to_string()),
|
|
|
|
};
|
|
|
|
match self.blockage_migration(req) {
|
|
|
|
Ok(resp) => {
|
|
|
|
let response = serde_json::to_string(&resp).unwrap();
|
|
|
|
prepare_header(response)
|
|
|
|
}
|
|
|
|
Err(e) => {
|
|
|
|
println!("Invalid Blockage Migration request, Proof Error");
|
|
|
|
prepare_error_header(e.to_string())
|
|
|
|
}
|
2023-06-13 12:03:06 -04:00
|
|
|
}
|
|
|
|
}
|
2023-04-04 19:34:35 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
fn prepare_header(response: String) -> Response<Body> {
|
|
|
|
let mut resp = Response::new(Body::from(response));
|
|
|
|
resp.headers_mut()
|
|
|
|
.insert("Access-Control-Allow-Origin", HeaderValue::from_static("*"));
|
|
|
|
resp
|
2023-05-11 11:11:57 -04:00
|
|
|
}
|
2023-06-13 12:03:06 -04:00
|
|
|
|
|
|
|
fn prepare_error_header(error: String) -> Response<Body> {
|
|
|
|
Response::builder()
|
|
|
|
.status(hyper::StatusCode::BAD_REQUEST)
|
|
|
|
.body(Body::from(error))
|
|
|
|
.unwrap()
|
|
|
|
}
|