go-waku/waku/v2/rpc/private.go

263 lines
6.4 KiB
Go
Raw Normal View History

package rpc
import (
"crypto/ecdsa"
"crypto/rand"
"fmt"
"net/http"
2022-06-13 18:30:35 +00:00
"strings"
2021-12-09 09:07:08 +00:00
"sync"
2022-06-13 18:30:35 +00:00
"github.com/ethereum/go-ethereum/common/hexutil"
"github.com/ethereum/go-ethereum/crypto"
"github.com/waku-org/go-waku/waku/v2/node"
"github.com/waku-org/go-waku/waku/v2/payload"
"github.com/waku-org/go-waku/waku/v2/protocol"
"github.com/waku-org/go-waku/waku/v2/protocol/pb"
"github.com/waku-org/go-waku/waku/v2/protocol/relay"
"github.com/waku-org/go-waku/waku/v2/utils"
"go.uber.org/zap"
)
type PrivateService struct {
node *node.WakuNode
log *zap.Logger
2021-12-09 09:07:08 +00:00
2022-06-13 18:30:35 +00:00
messages map[string][]*pb.WakuMessage
2022-10-20 13:19:23 +00:00
cacheCapacity int
2022-06-13 18:30:35 +00:00
messagesMutex sync.RWMutex
2021-12-09 09:07:08 +00:00
2022-06-13 18:30:35 +00:00
runner *runnerService
}
2022-06-13 18:30:35 +00:00
type SymmetricKeyReply string
type KeyPairReply struct {
PrivateKey string `json:"privateKey"`
2022-06-13 18:30:35 +00:00
PublicKey string `json:"publicKey"`
}
2021-12-08 08:52:27 +00:00
type SymmetricMessageArgs struct {
Topic string `json:"topic"`
Message *pb.WakuMessage `json:"message"`
SymKey string `json:"symkey"`
2021-12-08 08:52:27 +00:00
}
type AsymmetricMessageArgs struct {
Topic string `json:"topic"`
Message *pb.WakuMessage `json:"message"`
PublicKey string `json:"publicKey"`
2021-12-08 08:52:27 +00:00
}
type SymmetricMessagesArgs struct {
Topic string `json:"topic"`
SymKey string `json:"symkey"`
}
type AsymmetricMessagesArgs struct {
Topic string `json:"topic"`
PrivateKey string `json:"privateKey"`
}
2022-10-20 13:19:23 +00:00
func NewPrivateService(node *node.WakuNode, cacheCapacity int, log *zap.Logger) *PrivateService {
2022-06-13 18:30:35 +00:00
p := &PrivateService{
2022-10-20 13:19:23 +00:00
node: node,
cacheCapacity: cacheCapacity,
messages: make(map[string][]*pb.WakuMessage),
log: log.Named("private"),
2021-12-08 08:52:27 +00:00
}
2022-06-13 18:30:35 +00:00
p.runner = newRunnerService(node.Broadcaster(), p.addEnvelope)
return p
}
func (p *PrivateService) addEnvelope(envelope *protocol.Envelope) {
p.messagesMutex.Lock()
defer p.messagesMutex.Unlock()
if _, ok := p.messages[envelope.PubsubTopic()]; !ok {
p.messages[envelope.PubsubTopic()] = make([]*pb.WakuMessage, 0)
}
2022-10-20 13:19:23 +00:00
// Keep a specific max number of messages per topic
if len(p.messages[envelope.PubsubTopic()]) >= p.cacheCapacity {
p.messages[envelope.PubsubTopic()] = p.messages[envelope.PubsubTopic()][1:]
}
2022-06-13 18:30:35 +00:00
p.messages[envelope.PubsubTopic()] = append(p.messages[envelope.PubsubTopic()], envelope.Message())
2021-12-08 08:52:27 +00:00
}
func (p *PrivateService) GetV1SymmetricKey(req *http.Request, args *Empty, reply *SymmetricKeyReply) error {
key := [32]byte{}
_, err := rand.Read(key[:])
if err != nil {
return err
}
2022-06-13 18:30:35 +00:00
*reply = SymmetricKeyReply(hexutil.Encode(key[:]))
return nil
}
func (p *PrivateService) GetV1AsymmetricKeypair(req *http.Request, args *Empty, reply *KeyPairReply) error {
privateKey, err := crypto.GenerateKey()
if err != nil {
return err
}
privateKeyBytes := crypto.FromECDSA(privateKey)
publicKey := privateKey.Public()
publicKeyECDSA, ok := publicKey.(*ecdsa.PublicKey)
if !ok {
return fmt.Errorf("cannot assert type: publicKey is not of type *ecdsa.PublicKey")
}
publicKeyBytes := crypto.FromECDSAPub(publicKeyECDSA)
2022-06-13 18:30:35 +00:00
reply.PrivateKey = hexutil.Encode(privateKeyBytes[:])
reply.PublicKey = hexutil.Encode(publicKeyBytes[:])
return nil
}
2021-12-08 08:52:27 +00:00
func (p *PrivateService) PostV1SymmetricMessage(req *http.Request, args *SymmetricMessageArgs, reply *SuccessReply) error {
2022-09-14 19:19:04 +00:00
symKeyBytes, err := utils.DecodeHexString(args.SymKey)
2022-06-13 18:30:35 +00:00
if err != nil {
return fmt.Errorf("invalid symmetric key: %w", err)
}
keyInfo := new(payload.KeyInfo)
keyInfo.Kind = payload.Symmetric
2022-06-13 18:30:35 +00:00
keyInfo.SymKey = symKeyBytes
msg := args.Message
2022-06-13 18:30:35 +00:00
msg.Version = 1
2021-12-08 08:52:27 +00:00
err = payload.EncodeWakuMessage(msg, keyInfo)
2021-12-08 08:52:27 +00:00
if err != nil {
2022-06-14 15:36:34 +00:00
return err
2021-12-09 09:07:08 +00:00
}
2022-06-13 18:30:35 +00:00
topic := args.Topic
if topic == "" {
topic = relay.DefaultWakuTopic
}
_, err = p.node.Relay().PublishToTopic(req.Context(), msg, topic)
2021-12-09 09:07:08 +00:00
if err != nil {
2022-06-14 15:36:34 +00:00
return err
2021-12-08 08:52:27 +00:00
}
2022-06-14 15:36:34 +00:00
*reply = true
2021-12-08 08:52:27 +00:00
return nil
}
2022-06-13 18:30:35 +00:00
func (p *PrivateService) PostV1AsymmetricMessage(req *http.Request, args *AsymmetricMessageArgs, reply *bool) error {
keyInfo := new(payload.KeyInfo)
keyInfo.Kind = payload.Asymmetric
2022-06-13 18:30:35 +00:00
2022-09-14 19:19:04 +00:00
pubKeyBytes, err := utils.DecodeHexString(args.PublicKey)
2021-12-08 08:52:27 +00:00
if err != nil {
return fmt.Errorf("public key cannot be decoded: %v", err)
}
pubKey, err := crypto.UnmarshalPubkey(pubKeyBytes)
if err != nil {
return fmt.Errorf("public key cannot be unmarshalled: %v", err)
}
2022-06-13 18:30:35 +00:00
2021-12-08 08:52:27 +00:00
keyInfo.PubKey = *pubKey
msg := args.Message
2022-06-13 18:30:35 +00:00
msg.Version = 1
err = payload.EncodeWakuMessage(msg, keyInfo)
2021-12-08 08:52:27 +00:00
if err != nil {
2022-06-13 18:30:35 +00:00
return err
2021-12-09 09:07:08 +00:00
}
2022-06-13 18:30:35 +00:00
topic := args.Topic
if topic == "" {
topic = relay.DefaultWakuTopic
2021-12-09 09:07:08 +00:00
}
2022-06-13 18:30:35 +00:00
_, err = p.node.Relay().PublishToTopic(req.Context(), msg, topic)
if err != nil {
return err
2021-12-08 08:52:27 +00:00
}
2022-06-13 18:30:35 +00:00
*reply = true
2021-12-08 08:52:27 +00:00
return nil
}
2021-12-08 08:52:27 +00:00
func (p *PrivateService) GetV1SymmetricMessages(req *http.Request, args *SymmetricMessagesArgs, reply *MessagesReply) error {
2022-06-13 18:30:35 +00:00
p.messagesMutex.Lock()
defer p.messagesMutex.Unlock()
if _, ok := p.messages[args.Topic]; !ok {
p.messages[args.Topic] = make([]*pb.WakuMessage, 0)
}
2022-09-14 19:19:04 +00:00
symKeyBytes, err := utils.DecodeHexString(args.SymKey)
2022-06-13 18:30:35 +00:00
if err != nil {
return fmt.Errorf("invalid symmetric key: %w", err)
}
messages := make([]*pb.WakuMessage, len(p.messages[args.Topic]))
copy(messages, p.messages[args.Topic])
p.messages[args.Topic] = make([]*pb.WakuMessage, 0)
var decodedMessages []*pb.WakuMessage
for _, msg := range messages {
err := payload.DecodeWakuMessage(msg, &payload.KeyInfo{
Kind: payload.Symmetric,
2022-06-13 18:30:35 +00:00
SymKey: symKeyBytes,
})
if err != nil {
continue
}
decodedMessages = append(decodedMessages, msg)
}
2021-12-09 09:07:08 +00:00
*reply = decodedMessages
2021-12-09 09:07:08 +00:00
return nil
}
2021-12-08 08:52:27 +00:00
func (p *PrivateService) GetV1AsymmetricMessages(req *http.Request, args *AsymmetricMessagesArgs, reply *MessagesReply) error {
2022-06-13 18:30:35 +00:00
p.messagesMutex.Lock()
defer p.messagesMutex.Unlock()
2021-12-09 09:07:08 +00:00
2022-06-13 18:30:35 +00:00
if _, ok := p.messages[args.Topic]; !ok {
p.messages[args.Topic] = make([]*pb.WakuMessage, 0)
}
messages := make([]*pb.WakuMessage, len(p.messages[args.Topic]))
copy(messages, p.messages[args.Topic])
p.messages[args.Topic] = make([]*pb.WakuMessage, 0)
privKey, err := crypto.HexToECDSA(strings.TrimPrefix(args.PrivateKey, "0x"))
if err != nil {
return fmt.Errorf("invalid asymmetric key: %w", err)
}
var decodedMessages []*pb.WakuMessage
for _, msg := range messages {
err := payload.DecodeWakuMessage(msg, &payload.KeyInfo{
Kind: payload.Asymmetric,
2022-06-13 18:30:35 +00:00
PrivKey: privKey,
})
if err != nil {
continue
}
decodedMessages = append(decodedMessages, msg)
}
*reply = decodedMessages
2021-12-09 09:07:08 +00:00
return nil
}
2022-06-13 18:30:35 +00:00
func (p *PrivateService) Start() {
p.runner.Start()
}
func (p *PrivateService) Stop() {
p.runner.Stop()
}