nim-libp2p/libp2p/signed_envelope.nim

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

163 lines
4.3 KiB
Nim
Raw Normal View History

2022-07-01 18:19:57 +00:00
# Nim-Libp2p
2023-01-20 14:47:40 +00:00
# Copyright (c) 2023 Status Research & Development GmbH
2022-07-01 18:19:57 +00:00
# Licensed under either of
# * Apache License, version 2.0, ([LICENSE-APACHE](LICENSE-APACHE))
# * MIT license ([LICENSE-MIT](LICENSE-MIT))
# at your option.
# This file may not be copied, modified, or distributed except according to
# those terms.
## This module implements Signed Envelope.
2023-06-07 11:12:49 +00:00
{.push raises: [].}
import std/sugar
import pkg/stew/[results, byteutils]
import multicodec, crypto/crypto, protobuf/minprotobuf, vbuffer
export crypto
type
EnvelopeError* = enum
EnvelopeInvalidProtobuf
EnvelopeFieldMissing
EnvelopeInvalidSignature
EnvelopeWrongType
Envelope* = object
publicKey*: PublicKey
domain*: string
payloadType*: seq[byte]
payload: seq[byte]
signature*: Signature
proc mapProtobufError(e: ProtoError): EnvelopeError =
case e
of RequiredFieldMissing: EnvelopeFieldMissing
else: EnvelopeInvalidProtobuf
proc getSignatureBuffer(e: Envelope): seq[byte] =
var buffer = initVBuffer()
let domainBytes = e.domain.toBytes()
buffer.writeSeq(domainBytes)
buffer.writeSeq(e.payloadType)
buffer.writeSeq(e.payload)
buffer.buffer
proc decode*(
T: typedesc[Envelope], buf: seq[byte], domain: string
): Result[Envelope, EnvelopeError] =
let pb = initProtoBuffer(buf)
var envelope = Envelope()
envelope.domain = domain
?pb.getRequiredField(1, envelope.publicKey).mapErr(mapProtobufError)
discard ?pb.getField(2, envelope.payloadType).mapErr(mapProtobufError)
?pb.getRequiredField(3, envelope.payload).mapErr(mapProtobufError)
?pb.getRequiredField(5, envelope.signature).mapErr(mapProtobufError)
if envelope.signature.verify(envelope.getSignatureBuffer(), envelope.publicKey) ==
false:
err(EnvelopeInvalidSignature)
else:
ok(envelope)
proc init*(
T: typedesc[Envelope],
privateKey: PrivateKey,
payloadType: seq[byte],
payload: seq[byte],
domain: string,
): Result[Envelope, CryptoError] =
var envelope = Envelope(
publicKey: ?privateKey.getPublicKey(),
domain: domain,
payloadType: payloadType,
payload: payload,
)
envelope.signature = ?privateKey.sign(envelope.getSignatureBuffer())
ok(envelope)
proc encode*(env: Envelope): Result[seq[byte], CryptoError] =
var pb = initProtoBuffer()
try:
pb.write(1, env.publicKey)
pb.write(2, env.payloadType)
pb.write(3, env.payload)
pb.write(5, env.signature)
except ResultError[CryptoError] as exc:
return err(exc.error)
pb.finish()
ok(pb.buffer)
proc payload*(env: Envelope): seq[byte] =
# Payload is readonly
env.payload
proc getField*(
pb: ProtoBuffer, field: int, value: var Envelope, domain: string
): ProtoResult[bool] {.inline.} =
var buffer: seq[byte]
let res = ?pb.getField(field, buffer)
if not (res):
ok(false)
else:
value = Envelope.decode(buffer, domain).valueOr:
return err(ProtoError.IncorrectBlob)
ok(true)
2022-08-01 12:31:22 +00:00
proc write*(pb: var ProtoBuffer, field: int, env: Envelope): Result[void, CryptoError] =
let e = ?env.encode()
pb.write(field, e)
2022-08-01 12:31:22 +00:00
ok()
type SignedPayload*[T] = object
# T needs to have .encode(), .decode(), .payloadType(), .domain()
envelope*: Envelope
data*: T
proc init*[T](
_: typedesc[SignedPayload[T]], privateKey: PrivateKey, data: T
): Result[SignedPayload[T], CryptoError] =
mixin encode
let envelope =
?Envelope.init(privateKey, T.payloadType(), data.encode(), T.payloadDomain)
ok(SignedPayload[T](data: data, envelope: envelope))
proc getField*[T](
pb: ProtoBuffer, field: int, value: var SignedPayload[T]
): ProtoResult[bool] {.inline.} =
if not ?getField(pb, field, value.envelope, T.payloadDomain):
ok(false)
else:
mixin decode
value.data = ?T.decode(value.envelope.payload).mapErr(x => ProtoError.IncorrectBlob)
ok(true)
proc decode*[T](
_: typedesc[SignedPayload[T]], buffer: seq[byte]
): Result[SignedPayload[T], EnvelopeError] =
let
envelope = ?Envelope.decode(buffer, T.payloadDomain)
data = ?T.decode(envelope.payload).mapErr(x => EnvelopeInvalidProtobuf)
signedPayload = SignedPayload[T](envelope: envelope, data: data)
if envelope.payloadType != T.payloadType:
return err(EnvelopeWrongType)
when compiles(?signedPayload.checkValid()):
?signedPayload.checkValid()
ok(signedPayload)
proc encode*[T](msg: SignedPayload[T]): Result[seq[byte], CryptoError] =
msg.envelope.encode()