|
@@ -1,3 +1,4 @@
|
|
|
+use anyhow::{anyhow, Result};
|
|
|
use lox_library::{
|
|
|
bridge_table::{from_scalar, BridgeLine, BridgeTable, EncryptedBucket, MAX_BRIDGES_PER_BUCKET},
|
|
|
cred,
|
|
@@ -8,8 +9,6 @@ use lox_library::{
|
|
|
scalar_u32, IssuerPubKey, OPENINV_LENGTH,
|
|
|
};
|
|
|
use lox_utils::{EncBridgeTable, Invite};
|
|
|
-use serde::de::Error as SerdeError;
|
|
|
-use serde_json::error::Error;
|
|
|
use std::collections::HashMap;
|
|
|
|
|
|
pub mod networking;
|
|
@@ -53,8 +52,10 @@ pub async fn eligible_for_trust_promotion(
|
|
|
return false;
|
|
|
}
|
|
|
};
|
|
|
- scalar_u32(&cred.trust_level).unwrap() == 0
|
|
|
- && level_since + trust_promotion::UNTRUSTED_INTERVAL <= date
|
|
|
+ match scalar_u32(&cred.trust_level) {
|
|
|
+ Some(v) => v == 0 && level_since + trust_promotion::UNTRUSTED_INTERVAL <= date,
|
|
|
+ None => false,
|
|
|
+ }
|
|
|
}
|
|
|
|
|
|
// Helper function to check if credential is eligible for
|
|
@@ -71,23 +72,29 @@ pub async fn eligible_for_level_up(net: &dyn Networking, cred: &lox_library::cre
|
|
|
return false;
|
|
|
}
|
|
|
};
|
|
|
- let trust_level = scalar_u32(&cred.trust_level).unwrap();
|
|
|
- let blockages = scalar_u32(&cred.blockages).unwrap();
|
|
|
+ let trust_level = match scalar_u32(&cred.trust_level) {
|
|
|
+ Some(v) => v,
|
|
|
+ None => return false,
|
|
|
+ };
|
|
|
+ let blockages = match scalar_u32(&cred.blockages) {
|
|
|
+ Some(v) => v,
|
|
|
+ None => return false,
|
|
|
+ };
|
|
|
trust_level > 0
|
|
|
&& blockages <= MAX_BLOCKAGES[trust_level as usize]
|
|
|
&& level_since + LEVEL_INTERVAL[trust_level as usize] <= date
|
|
|
}
|
|
|
|
|
|
// Get current date from Lox Auth
|
|
|
-pub async fn get_today(net: &dyn Networking) -> Result<u32, Error> {
|
|
|
- let resp = net.request("/today".to_string(), [].to_vec()).await;
|
|
|
+pub async fn get_today(net: &dyn Networking) -> Result<u32> {
|
|
|
+ let resp = net.request("/today".to_string(), [].to_vec()).await?;
|
|
|
let today: u32 = serde_json::from_slice(&resp)?;
|
|
|
Ok(today)
|
|
|
}
|
|
|
|
|
|
// Download Lox Auth pubkeys
|
|
|
-pub async fn get_lox_auth_keys(net: &dyn Networking) -> Result<Vec<IssuerPubKey>, Error> {
|
|
|
- let resp = net.request("/pubkeys".to_string(), [].to_vec()).await;
|
|
|
+pub async fn get_lox_auth_keys(net: &dyn Networking) -> Result<Vec<IssuerPubKey>> {
|
|
|
+ let resp = net.request("/pubkeys".to_string(), [].to_vec()).await?;
|
|
|
let lox_auth_pubkeys: Vec<IssuerPubKey> = serde_json::from_slice(&resp)?;
|
|
|
Ok(lox_auth_pubkeys)
|
|
|
}
|
|
@@ -95,8 +102,10 @@ pub async fn get_lox_auth_keys(net: &dyn Networking) -> Result<Vec<IssuerPubKey>
|
|
|
// Get encrypted bridge table
|
|
|
pub async fn get_reachability_credential(
|
|
|
net: &dyn Networking,
|
|
|
-) -> Result<HashMap<u32, EncryptedBucket>, Error> {
|
|
|
- let resp = net.request("/reachability".to_string(), [].to_vec()).await;
|
|
|
+) -> Result<HashMap<u32, EncryptedBucket>> {
|
|
|
+ let resp = net
|
|
|
+ .request("/reachability".to_string(), [].to_vec())
|
|
|
+ .await?;
|
|
|
let reachability_cred: EncBridgeTable = serde_json::from_slice(&resp)?;
|
|
|
Ok(reachability_cred.etable)
|
|
|
}
|
|
@@ -105,28 +114,40 @@ pub async fn get_reachability_credential(
|
|
|
pub async fn get_bucket(
|
|
|
net: &dyn Networking,
|
|
|
lox_cred: &lox_library::cred::Lox,
|
|
|
-) -> Result<
|
|
|
- (
|
|
|
- [BridgeLine; MAX_BRIDGES_PER_BUCKET],
|
|
|
- Option<cred::BucketReachability>,
|
|
|
- ),
|
|
|
- Error,
|
|
|
-> {
|
|
|
+) -> Result<(
|
|
|
+ [BridgeLine; MAX_BRIDGES_PER_BUCKET],
|
|
|
+ Option<cred::BucketReachability>,
|
|
|
+)> {
|
|
|
let encbuckets = get_reachability_credential(net).await?;
|
|
|
- let (id, key) = from_scalar(lox_cred.bucket).unwrap();
|
|
|
+ let (id, key) = match from_scalar(lox_cred.bucket) {
|
|
|
+ Ok((id, key)) => (id, key),
|
|
|
+ Err(e) => {
|
|
|
+ return Err(anyhow!(
|
|
|
+ "aead error returned when trying to get id and key from bucket: {}",
|
|
|
+ e
|
|
|
+ ))
|
|
|
+ }
|
|
|
+ };
|
|
|
let encbucket = match encbuckets.get(&id) {
|
|
|
- Some(encbucket) => encbucket,
|
|
|
+ Some(v) => v,
|
|
|
None => {
|
|
|
- // This is probably an abuse of the serde_json Error struct.
|
|
|
- return Err(Error::missing_field("Provided ID not found"));
|
|
|
+ return Err(anyhow!(
|
|
|
+ "Unable to get encrypted bucket from encrypted bridge table"
|
|
|
+ ))
|
|
|
}
|
|
|
};
|
|
|
- Ok(BridgeTable::decrypt_bucket(id, &key, &encbucket).unwrap())
|
|
|
+ match BridgeTable::decrypt_bucket(id, &key, &encbucket) {
|
|
|
+ Ok(v) => Ok(v),
|
|
|
+ Err(e) => Err(anyhow!(
|
|
|
+ "aead error returned when trying to decrypt bucket: {}",
|
|
|
+ e
|
|
|
+ )),
|
|
|
+ }
|
|
|
}
|
|
|
|
|
|
// Get an open invitation
|
|
|
-pub async fn get_open_invitation(net: &dyn Networking) -> Result<[u8; OPENINV_LENGTH], Error> {
|
|
|
- let resp = net.request("/invite".to_string(), [].to_vec()).await;
|
|
|
+pub async fn get_open_invitation(net: &dyn Networking) -> Result<[u8; OPENINV_LENGTH]> {
|
|
|
+ let resp = net.request("/invite".to_string(), [].to_vec()).await?;
|
|
|
let open_invite: [u8; OPENINV_LENGTH] = serde_json::from_slice::<Invite>(&resp)?.invite;
|
|
|
Ok(open_invite)
|
|
|
}
|
|
@@ -136,12 +157,12 @@ pub async fn get_lox_credential(
|
|
|
net: &dyn Networking,
|
|
|
open_invite: &[u8; OPENINV_LENGTH],
|
|
|
lox_pub: &IssuerPubKey,
|
|
|
-) -> Result<(lox_library::cred::Lox, BridgeLine), Error> {
|
|
|
+) -> Result<(lox_library::cred::Lox, BridgeLine)> {
|
|
|
let (req, state) = open_invite::request(&open_invite);
|
|
|
let encoded_req: Vec<u8> = serde_json::to_vec(&req)?;
|
|
|
- let encoded_resp = net.request("/openreq".to_string(), encoded_req).await;
|
|
|
+ let encoded_resp = net.request("/openreq".to_string(), encoded_req).await?;
|
|
|
let decoded_resp: open_invite::Response = serde_json::from_slice(&encoded_resp)?;
|
|
|
- let (cred, bridgeline) = open_invite::handle_response(state, decoded_resp, &lox_pub).unwrap();
|
|
|
+ let (cred, bridgeline) = open_invite::handle_response(state, decoded_resp, &lox_pub)?;
|
|
|
Ok((cred, bridgeline))
|
|
|
}
|
|
|
|
|
@@ -150,13 +171,12 @@ pub async fn trust_promotion(
|
|
|
net: &dyn Networking,
|
|
|
lox_cred: &lox_library::cred::Lox,
|
|
|
lox_pub: &IssuerPubKey,
|
|
|
-) -> Result<lox_library::cred::Migration, Error> {
|
|
|
- let (req, state) =
|
|
|
- trust_promotion::request(&lox_cred, &lox_pub, get_today(net).await?).unwrap();
|
|
|
+) -> Result<lox_library::cred::Migration> {
|
|
|
+ let (req, state) = trust_promotion::request(&lox_cred, &lox_pub, get_today(net).await?)?;
|
|
|
let encoded_req: Vec<u8> = serde_json::to_vec(&req)?;
|
|
|
- let encoded_resp = net.request("/trustpromo".to_string(), encoded_req).await;
|
|
|
+ let encoded_resp = net.request("/trustpromo".to_string(), encoded_req).await?;
|
|
|
let decoded_resp: trust_promotion::Response = serde_json::from_slice(&encoded_resp)?;
|
|
|
- let migration_cred = trust_promotion::handle_response(state, decoded_resp).unwrap();
|
|
|
+ let migration_cred = trust_promotion::handle_response(state, decoded_resp)?;
|
|
|
Ok(migration_cred)
|
|
|
}
|
|
|
|
|
@@ -167,13 +187,12 @@ pub async fn trust_migration(
|
|
|
migration_cred: &lox_library::cred::Migration,
|
|
|
lox_pub: &IssuerPubKey,
|
|
|
migration_pub: &IssuerPubKey,
|
|
|
-) -> Result<lox_library::cred::Lox, Error> {
|
|
|
- let (req, state) =
|
|
|
- migration::request(lox_cred, migration_cred, lox_pub, migration_pub).unwrap();
|
|
|
+) -> Result<lox_library::cred::Lox> {
|
|
|
+ let (req, state) = migration::request(lox_cred, migration_cred, lox_pub, migration_pub)?;
|
|
|
let encoded_req: Vec<u8> = serde_json::to_vec(&req)?;
|
|
|
- let encoded_resp = net.request("/trustmig".to_string(), encoded_req).await;
|
|
|
+ let encoded_resp = net.request("/trustmig".to_string(), encoded_req).await?;
|
|
|
let decoded_resp: migration::Response = serde_json::from_slice(&encoded_resp)?;
|
|
|
- let cred = migration::handle_response(state, decoded_resp, lox_pub).unwrap();
|
|
|
+ let cred = migration::handle_response(state, decoded_resp, lox_pub)?;
|
|
|
Ok(cred)
|
|
|
}
|
|
|
|
|
@@ -184,19 +203,18 @@ pub async fn level_up(
|
|
|
reachcred: &cred::BucketReachability,
|
|
|
lox_pub: &IssuerPubKey,
|
|
|
reachability_pub: &IssuerPubKey,
|
|
|
-) -> Result<lox_library::cred::Lox, Error> {
|
|
|
+) -> Result<lox_library::cred::Lox> {
|
|
|
let (req, state) = level_up::request(
|
|
|
lox_cred,
|
|
|
&reachcred,
|
|
|
lox_pub,
|
|
|
reachability_pub,
|
|
|
get_today(net).await?,
|
|
|
- )
|
|
|
- .unwrap();
|
|
|
+ )?;
|
|
|
let encoded_req: Vec<u8> = serde_json::to_vec(&req)?;
|
|
|
- let encoded_resp = net.request("/levelup".to_string(), encoded_req).await;
|
|
|
+ let encoded_resp = net.request("/levelup".to_string(), encoded_req).await?;
|
|
|
let decoded_resp: level_up::Response = serde_json::from_slice(&encoded_resp)?;
|
|
|
- let cred = level_up::handle_response(state, decoded_resp, lox_pub).unwrap();
|
|
|
+ let cred = level_up::handle_response(state, decoded_resp, lox_pub)?;
|
|
|
Ok(cred)
|
|
|
}
|
|
|
|
|
@@ -208,19 +226,42 @@ pub async fn issue_invite(
|
|
|
lox_pub: &IssuerPubKey,
|
|
|
reachability_pub: &IssuerPubKey,
|
|
|
invitation_pub: &IssuerPubKey,
|
|
|
-) -> Result<(lox_library::cred::Lox, lox_library::cred::Invitation), Error> {
|
|
|
+) -> Result<(lox_library::cred::Lox, lox_library::cred::Invitation)> {
|
|
|
// Read the bucket in the credential to get today's Bucket
|
|
|
// Reachability credential
|
|
|
|
|
|
- let (id, key) = from_scalar(lox_cred.bucket).unwrap();
|
|
|
- let bucket = BridgeTable::decrypt_bucket(id, &key, &encbuckets.get(&id).unwrap()).unwrap();
|
|
|
+ let (id, key) = match from_scalar(lox_cred.bucket) {
|
|
|
+ Ok((id, key)) => (id, key),
|
|
|
+ Err(e) => {
|
|
|
+ return Err(anyhow!(
|
|
|
+ "aead error returned when trying to get id and key from bucket: {}",
|
|
|
+ e
|
|
|
+ ))
|
|
|
+ }
|
|
|
+ };
|
|
|
+ let encbucket = match encbuckets.get(&id) {
|
|
|
+ Some(v) => v,
|
|
|
+ None => {
|
|
|
+ return Err(anyhow!(
|
|
|
+ "Unable to get encrypted bucket from encrypted bridge table"
|
|
|
+ ))
|
|
|
+ }
|
|
|
+ };
|
|
|
+ let bucket = match BridgeTable::decrypt_bucket(id, &key, encbucket) {
|
|
|
+ Ok(v) => v,
|
|
|
+ Err(e) => {
|
|
|
+ return Err(anyhow!(
|
|
|
+ "aead error returned when trying to decrypt bucket: {}",
|
|
|
+ e
|
|
|
+ ))
|
|
|
+ }
|
|
|
+ };
|
|
|
let reachcred = match bucket.1 {
|
|
|
Some(v) => v,
|
|
|
None => {
|
|
|
- // This is probably an abuse of the serde_json Error struct.
|
|
|
- return Err(Error::missing_field(
|
|
|
- "Expected reachability credential but none was found",
|
|
|
- ));
|
|
|
+ return Err(anyhow!(
|
|
|
+ "Expected reachability credential but none was found"
|
|
|
+ ))
|
|
|
}
|
|
|
};
|
|
|
|
|
@@ -230,13 +271,12 @@ pub async fn issue_invite(
|
|
|
lox_pub,
|
|
|
reachability_pub,
|
|
|
get_today(net).await?,
|
|
|
- )
|
|
|
- .unwrap();
|
|
|
+ )?;
|
|
|
let encoded_req: Vec<u8> = serde_json::to_vec(&req)?;
|
|
|
- let encoded_resp = net.request("/issueinvite".to_string(), encoded_req).await;
|
|
|
+ let encoded_resp = net.request("/issueinvite".to_string(), encoded_req).await?;
|
|
|
let decoded_resp: issue_invite::Response = serde_json::from_slice(&encoded_resp)?;
|
|
|
let (cred, invite) =
|
|
|
- issue_invite::handle_response(state, decoded_resp, lox_pub, invitation_pub).unwrap();
|
|
|
+ issue_invite::handle_response(state, decoded_resp, lox_pub, invitation_pub)?;
|
|
|
Ok((cred, invite))
|
|
|
}
|
|
|
|
|
@@ -246,13 +286,12 @@ pub async fn redeem_invite(
|
|
|
invite: &lox_library::cred::Invitation,
|
|
|
lox_pub: &IssuerPubKey,
|
|
|
invitation_pub: &IssuerPubKey,
|
|
|
-) -> Result<(lox_library::cred::Lox, [BridgeLine; MAX_BRIDGES_PER_BUCKET]), Error> {
|
|
|
- let (req, state) =
|
|
|
- redeem_invite::request(invite, invitation_pub, get_today(net).await?).unwrap();
|
|
|
+) -> Result<(lox_library::cred::Lox, [BridgeLine; MAX_BRIDGES_PER_BUCKET])> {
|
|
|
+ let (req, state) = redeem_invite::request(invite, invitation_pub, get_today(net).await?)?;
|
|
|
let encoded_req: Vec<u8> = serde_json::to_vec(&req)?;
|
|
|
- let encoded_resp = net.request("/redeem".to_string(), encoded_req).await;
|
|
|
+ let encoded_resp = net.request("/redeem".to_string(), encoded_req).await?;
|
|
|
let decoded_resp: redeem_invite::Response = serde_json::from_slice(&encoded_resp)?;
|
|
|
- let cred = redeem_invite::handle_response(state, decoded_resp, lox_pub).unwrap();
|
|
|
+ let cred = redeem_invite::handle_response(state, decoded_resp, lox_pub)?;
|
|
|
|
|
|
let bucket = get_bucket(net, &cred).await?.0;
|
|
|
Ok((cred, bucket))
|
|
@@ -263,12 +302,14 @@ pub async fn check_blockage(
|
|
|
net: &dyn Networking,
|
|
|
lox_cred: &lox_library::cred::Lox,
|
|
|
lox_pub: &IssuerPubKey,
|
|
|
-) -> Result<lox_library::cred::Migration, Error> {
|
|
|
- let (req, state) = check_blockage::request(lox_cred, lox_pub).unwrap();
|
|
|
+) -> Result<lox_library::cred::Migration> {
|
|
|
+ let (req, state) = check_blockage::request(lox_cred, lox_pub)?;
|
|
|
let encoded_req: Vec<u8> = serde_json::to_vec(&req)?;
|
|
|
- let encoded_resp = net.request("/checkblockage".to_string(), encoded_req).await;
|
|
|
+ let encoded_resp = net
|
|
|
+ .request("/checkblockage".to_string(), encoded_req)
|
|
|
+ .await?;
|
|
|
let decoded_resp: check_blockage::Response = serde_json::from_slice(&encoded_resp)?;
|
|
|
- let migcred = check_blockage::handle_response(state, decoded_resp).unwrap();
|
|
|
+ let migcred = check_blockage::handle_response(state, decoded_resp)?;
|
|
|
Ok(migcred)
|
|
|
}
|
|
|
|
|
@@ -279,15 +320,14 @@ pub async fn blockage_migration(
|
|
|
migcred: &lox_library::cred::Migration,
|
|
|
lox_pub: &IssuerPubKey,
|
|
|
migration_pub: &IssuerPubKey,
|
|
|
-) -> Result<lox_library::cred::Lox, Error> {
|
|
|
- let (req, state) =
|
|
|
- blockage_migration::request(lox_cred, migcred, lox_pub, migration_pub).unwrap();
|
|
|
+) -> Result<lox_library::cred::Lox> {
|
|
|
+ let (req, state) = blockage_migration::request(lox_cred, migcred, lox_pub, migration_pub)?;
|
|
|
let encoded_req: Vec<u8> = serde_json::to_vec(&req)?;
|
|
|
let encoded_resp = net
|
|
|
.request("/blockagemigration".to_string(), encoded_req)
|
|
|
- .await;
|
|
|
+ .await?;
|
|
|
let decoded_resp: blockage_migration::Response = serde_json::from_slice(&encoded_resp)?;
|
|
|
- let cred = blockage_migration::handle_response(state, decoded_resp, lox_pub).unwrap();
|
|
|
+ let cred = blockage_migration::handle_response(state, decoded_resp, lox_pub)?;
|
|
|
Ok(cred)
|
|
|
}
|
|
|
|