2023-05-11 11:11:57 -04:00
|
|
|
use hyper::{body::Bytes, header::HeaderValue, Body, Response};
|
2023-04-04 19:34:35 -04:00
|
|
|
|
|
|
|
use lox::{
|
2023-04-05 16:26:23 -04:00
|
|
|
bridge_table::{BridgeLine, ENC_BUCKET_BYTES, MAX_BRIDGES_PER_BUCKET},
|
2023-04-04 19:34:35 -04:00
|
|
|
proto::{
|
|
|
|
blockage_migration, check_blockage, issue_invite, level_up, migration, open_invite,
|
|
|
|
redeem_invite, trust_promotion,
|
|
|
|
},
|
2023-06-06 20:27:49 -04:00
|
|
|
BridgeAuth, BridgeDb, IssuerPubKey,
|
2023-04-04 19:34:35 -04:00
|
|
|
};
|
2023-06-06 20:27:49 -04:00
|
|
|
use lox_utils;
|
2023-05-11 11:11:57 -04:00
|
|
|
use std::sync::{Arc, Mutex};
|
2023-04-04 19:34:35 -04:00
|
|
|
|
|
|
|
#[derive(Clone)]
|
|
|
|
pub struct LoxServerContext {
|
|
|
|
pub db: Arc<Mutex<BridgeDb>>,
|
|
|
|
pub ba: Arc<Mutex<BridgeAuth>>,
|
2023-04-05 16:26:23 -04:00
|
|
|
pub extra_bridges: Arc<Mutex<Vec<BridgeLine>>>,
|
2023-05-11 11:07:42 -04:00
|
|
|
pub unreplaced_bridges: Arc<Mutex<Vec<BridgeLine>>>,
|
2023-04-04 19:34:35 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
impl LoxServerContext {
|
2023-05-11 11:11:57 -04:00
|
|
|
pub fn append_extra_bridges(&self, bridge: BridgeLine) {
|
2023-04-05 16:26:23 -04:00
|
|
|
let mut extra_bridges = self.extra_bridges.lock().unwrap();
|
|
|
|
extra_bridges.push(bridge);
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn remove_extra_bridges(&self) -> [BridgeLine; MAX_BRIDGES_PER_BUCKET] {
|
|
|
|
let mut extra_bridges = self.extra_bridges.lock().unwrap();
|
2023-04-10 12:16:19 -04:00
|
|
|
let mut return_bridges = [BridgeLine::default(); MAX_BRIDGES_PER_BUCKET];
|
2023-05-11 11:11:57 -04:00
|
|
|
for i in 0..MAX_BRIDGES_PER_BUCKET {
|
2023-04-10 12:16:19 -04:00
|
|
|
return_bridges[i] = extra_bridges.remove(i);
|
|
|
|
}
|
|
|
|
|
|
|
|
return_bridges
|
2023-04-05 16:26:23 -04:00
|
|
|
}
|
|
|
|
|
2023-05-17 12:46:09 -04:00
|
|
|
pub fn remove_single_bridge(&self) {
|
|
|
|
let mut extra_bridges = self.extra_bridges.lock().unwrap();
|
|
|
|
let length = extra_bridges.len();
|
|
|
|
_ = extra_bridges.remove(length - 1)
|
|
|
|
}
|
|
|
|
|
2023-05-11 11:07:42 -04:00
|
|
|
pub fn new_unreplaced_bridge(&self, bridge: BridgeLine) {
|
|
|
|
let mut unreplaced_bridges = self.unreplaced_bridges.lock().unwrap();
|
|
|
|
unreplaced_bridges.push(bridge);
|
|
|
|
}
|
|
|
|
|
2023-05-08 20:30:30 -04:00
|
|
|
pub fn allocate_leftover_bridges(&self) {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
let mut db_obj = self.db.lock().unwrap();
|
|
|
|
let mut extra_bridges = self.extra_bridges.lock().unwrap();
|
|
|
|
ba_obj.allocate_bridges(&mut extra_bridges, &mut db_obj);
|
|
|
|
}
|
|
|
|
|
2023-04-04 19:34:35 -04:00
|
|
|
pub fn add_openinv_bucket(&self, bucket: [BridgeLine; 3]) {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
let mut db_obj = self.db.lock().unwrap();
|
|
|
|
ba_obj.add_openinv_bridges(bucket, &mut db_obj);
|
|
|
|
}
|
|
|
|
|
2023-04-05 16:26:23 -04:00
|
|
|
pub fn add_spare_bucket(&self, bucket: [BridgeLine; 3]) {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
ba_obj.add_spare_bucket(bucket);
|
|
|
|
}
|
|
|
|
|
2023-05-03 20:11:10 -04:00
|
|
|
pub fn replace_with_new(&self, bridgeline: BridgeLine) -> bool {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
2023-05-17 12:46:09 -04:00
|
|
|
let eb_obj = self.extra_bridges.lock().unwrap();
|
|
|
|
let available_bridge = eb_obj.last();
|
|
|
|
// .last() doesn't actually remove the object so we still have to do that
|
|
|
|
if eb_obj.len() > 0 {
|
|
|
|
self.remove_single_bridge();
|
|
|
|
}
|
|
|
|
ba_obj.bridge_replace(&bridgeline, available_bridge)
|
2023-05-03 20:11:10 -04:00
|
|
|
}
|
2023-05-11 11:11:57 -04:00
|
|
|
|
2023-04-04 19:34:35 -04:00
|
|
|
pub fn add_unreachable(&self, bridgeline: BridgeLine) -> bool {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
let mut db_obj = self.db.lock().unwrap();
|
|
|
|
ba_obj.bridge_unreachable(&bridgeline, &mut db_obj)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn update_bridge(&self, bridgeline: BridgeLine) -> bool {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
ba_obj.bridge_update(&bridgeline)
|
|
|
|
}
|
|
|
|
|
2023-06-06 20:27:49 -04:00
|
|
|
#[cfg(test)]
|
|
|
|
/// For testing only: manually advance the day by the given number
|
|
|
|
/// of days.
|
2023-06-12 13:16:24 -04:00
|
|
|
pub fn advance_days_test(&self, num: u16) {
|
2023-04-04 19:34:35 -04:00
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
ba_obj.advance_days(num); // FOR TESTING ONLY
|
|
|
|
println!("Today's date according to server: {}", ba_obj.today());
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn encrypt_table(&self) -> Vec<[u8; ENC_BUCKET_BYTES]> {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
ba_obj.enc_bridge_table().clone()
|
|
|
|
}
|
|
|
|
|
|
|
|
fn pubkeys(&self) -> Vec<IssuerPubKey> {
|
|
|
|
let ba_obj = self.ba.lock().unwrap();
|
|
|
|
// vector of public keys (to serialize)
|
|
|
|
vec![
|
|
|
|
ba_obj.lox_pub.clone(),
|
|
|
|
ba_obj.migration_pub.clone(),
|
|
|
|
ba_obj.migrationkey_pub.clone(),
|
|
|
|
ba_obj.reachability_pub.clone(),
|
|
|
|
ba_obj.invitation_pub.clone(),
|
|
|
|
]
|
|
|
|
}
|
|
|
|
|
2023-06-06 20:27:49 -04:00
|
|
|
fn gen_invite(&self) -> lox_utils::Invite {
|
2023-04-04 19:34:35 -04:00
|
|
|
let obj = self.db.lock().unwrap();
|
2023-06-06 20:27:49 -04:00
|
|
|
lox_utils::Invite {
|
2023-04-04 19:34:35 -04:00
|
|
|
invite: obj.invite(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn open_inv(&self, req: open_invite::Request) -> open_invite::Response {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
ba_obj.handle_open_invite(req).unwrap()
|
|
|
|
}
|
|
|
|
|
|
|
|
fn trust_promo(&self, req: trust_promotion::Request) -> trust_promotion::Response {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
ba_obj.handle_trust_promotion(req).unwrap()
|
|
|
|
}
|
|
|
|
|
|
|
|
fn trust_migration(&self, req: migration::Request) -> migration::Response {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
ba_obj.handle_migration(req).unwrap()
|
|
|
|
}
|
|
|
|
|
|
|
|
fn level_up(&self, req: level_up::Request) -> level_up::Response {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
ba_obj.handle_level_up(req).unwrap()
|
|
|
|
}
|
|
|
|
|
|
|
|
fn issue_invite(&self, req: issue_invite::Request) -> issue_invite::Response {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
ba_obj.handle_issue_invite(req).unwrap()
|
|
|
|
}
|
|
|
|
|
|
|
|
fn redeem_invite(&self, req: redeem_invite::Request) -> redeem_invite::Response {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
ba_obj.handle_redeem_invite(req).unwrap()
|
|
|
|
}
|
|
|
|
|
|
|
|
fn check_blockage(&self, req: check_blockage::Request) -> check_blockage::Response {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
ba_obj.handle_check_blockage(req).unwrap()
|
|
|
|
}
|
|
|
|
|
|
|
|
fn blockage_migration(&self, req: blockage_migration::Request) -> blockage_migration::Response {
|
|
|
|
let mut ba_obj = self.ba.lock().unwrap();
|
|
|
|
ba_obj.handle_blockage_migration(req).unwrap()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Generate and return an open invitation token
|
|
|
|
pub fn generate_invite(context: LoxServerContext) -> Response<Body> {
|
|
|
|
let invite = context.gen_invite();
|
|
|
|
let token = serde_json::to_string(&invite).unwrap();
|
|
|
|
prepare_header(token)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Return the serialized encrypted bridge table
|
|
|
|
pub fn send_reachability_cred(context: LoxServerContext) -> Response<Body> {
|
|
|
|
let enc_table = context.encrypt_table();
|
2023-06-06 20:27:49 -04:00
|
|
|
let etable = lox_utils::EncBridgeTable { etable: enc_table };
|
2023-04-04 19:34:35 -04:00
|
|
|
prepare_header(serde_json::to_string(&etable).unwrap())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Return the serialized pubkeys for the Bridge Authority
|
|
|
|
pub fn send_keys(context: LoxServerContext) -> Response<Body> {
|
|
|
|
let pubkeys = context.pubkeys();
|
|
|
|
prepare_header(serde_json::to_string(&pubkeys).unwrap())
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn verify_and_send_open_cred(request: Bytes, context: LoxServerContext) -> Response<Body> {
|
|
|
|
let req: open_invite::Request = serde_json::from_slice(&request).unwrap();
|
|
|
|
let response = context.open_inv(req);
|
|
|
|
let open_invite_resp_str = serde_json::to_string(&response).unwrap();
|
|
|
|
prepare_header(open_invite_resp_str)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn verify_and_send_trust_promo(request: Bytes, context: LoxServerContext) -> Response<Body> {
|
|
|
|
let req: trust_promotion::Request = serde_json::from_slice(&request).unwrap();
|
|
|
|
let response = context.trust_promo(req);
|
|
|
|
let trust_promo_resp_str = serde_json::to_string(&response).unwrap();
|
|
|
|
prepare_header(trust_promo_resp_str)
|
|
|
|
}
|
|
|
|
|
2023-05-11 11:11:57 -04:00
|
|
|
pub fn verify_and_send_trust_migration(
|
|
|
|
request: Bytes,
|
|
|
|
context: LoxServerContext,
|
|
|
|
) -> Response<Body> {
|
2023-04-04 19:34:35 -04:00
|
|
|
let req: migration::Request = serde_json::from_slice(&request).unwrap();
|
|
|
|
let response = context.trust_migration(req);
|
|
|
|
let resp_str = serde_json::to_string(&response).unwrap();
|
|
|
|
prepare_header(resp_str)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn verify_and_send_level_up(request: Bytes, context: LoxServerContext) -> Response<Body> {
|
|
|
|
let req: level_up::Request = serde_json::from_slice(&request).unwrap();
|
|
|
|
let response = context.level_up(req);
|
|
|
|
let level_up_resp_str = serde_json::to_string(&response).unwrap();
|
|
|
|
prepare_header(level_up_resp_str)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn verify_and_send_issue_invite(request: Bytes, context: LoxServerContext) -> Response<Body> {
|
|
|
|
let req: issue_invite::Request = serde_json::from_slice(&request).unwrap();
|
|
|
|
let response = context.issue_invite(req);
|
|
|
|
let issue_invite_resp_str = serde_json::to_string(&response).unwrap();
|
|
|
|
prepare_header(issue_invite_resp_str)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn verify_and_send_redeem_invite(request: Bytes, context: LoxServerContext) -> Response<Body> {
|
|
|
|
let req: redeem_invite::Request = serde_json::from_slice(&request).unwrap();
|
|
|
|
let response = context.redeem_invite(req);
|
|
|
|
let redeem_invite_resp_str = serde_json::to_string(&response).unwrap();
|
|
|
|
prepare_header(redeem_invite_resp_str)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn verify_and_send_check_blockage(request: Bytes, context: LoxServerContext) -> Response<Body> {
|
|
|
|
let req: check_blockage::Request = serde_json::from_slice(&request).unwrap();
|
|
|
|
let response = context.check_blockage(req);
|
|
|
|
let check_blockage_resp_str = serde_json::to_string(&response).unwrap();
|
|
|
|
prepare_header(check_blockage_resp_str)
|
|
|
|
}
|
|
|
|
|
2023-05-11 11:11:57 -04:00
|
|
|
pub fn verify_and_send_blockage_migration(
|
|
|
|
request: Bytes,
|
|
|
|
context: LoxServerContext,
|
|
|
|
) -> Response<Body> {
|
2023-04-04 19:34:35 -04:00
|
|
|
let req: blockage_migration::Request = serde_json::from_slice(&request).unwrap();
|
|
|
|
let response = context.blockage_migration(req);
|
|
|
|
let resp_str = serde_json::to_string(&response).unwrap();
|
|
|
|
prepare_header(resp_str)
|
|
|
|
}
|
|
|
|
|
|
|
|
fn prepare_header(response: String) -> Response<Body> {
|
|
|
|
let mut resp = Response::new(Body::from(response));
|
|
|
|
resp.headers_mut()
|
|
|
|
.insert("Access-Control-Allow-Origin", HeaderValue::from_static("*"));
|
|
|
|
resp
|
2023-05-11 11:11:57 -04:00
|
|
|
}
|