status-go/server/pairing/payload_manager.go

598 lines
16 KiB
Go
Raw Normal View History

package pairing
import (
"crypto/rand"
"encoding/json"
"errors"
"fmt"
"io/ioutil"
"os"
"path/filepath"
"github.com/status-im/status-go/api"
"github.com/golang/protobuf/proto"
2022-10-21 12:15:39 +00:00
"go.uber.org/zap"
2022-06-24 23:09:01 +00:00
"github.com/status-im/status-go/account/generator"
"github.com/status-im/status-go/eth-node/keystore"
"github.com/status-im/status-go/multiaccounts"
"github.com/status-im/status-go/protocol/common"
"github.com/status-im/status-go/protocol/protobuf"
)
var (
ErrKeyFileAlreadyExists = errors.New("key file already exists")
)
// PayloadManager is the interface for PayloadManagers and wraps the basic functions for fulfilling payload management
2022-07-01 15:37:53 +00:00
type PayloadManager interface {
// Mount Loads the payload into the PayloadManager's state
2022-07-01 15:37:53 +00:00
Mount() error
// Receive stores data from an inbound source into the PayloadManager's state
2022-07-01 15:37:53 +00:00
Receive(data []byte) error
// ToSend returns an outbound safe (encrypted) payload
2022-07-01 15:37:53 +00:00
ToSend() []byte
// Received returns a decrypted and parsed payload from an inbound source
2022-07-01 15:37:53 +00:00
Received() []byte
// ResetPayload resets all payloads the PayloadManager has in its state
ResetPayload()
// EncryptPlain encrypts the given plaintext using internal key(s)
2022-08-19 12:45:50 +00:00
EncryptPlain(plaintext []byte) ([]byte, error)
// LockPayload prevents future excess to outbound safe and received data
LockPayload()
2022-07-01 15:37:53 +00:00
}
// PayloadSourceConfig represents location and access data of the pairing payload
// ONLY available from the application client
type PayloadSourceConfig struct {
// required
KeystorePath string `json:"keystorePath"`
// following 2 fields r optional.
// optional cases:
// 1. server mode is Receiving and server side doesn't contain this info
// 2. server mode is Sending and client side doesn't contain this info
// they are required in other cases
KeyUID string `json:"keyUID"`
Password string `json:"password"`
}
// AccountPayloadManagerConfig represents the initialisation parameters required for a AccountPayloadManager
type AccountPayloadManagerConfig struct {
DB *multiaccounts.Database
*PayloadSourceConfig
2022-07-01 15:37:53 +00:00
}
// AccountPayloadManager is responsible for the whole lifecycle of a AccountPayload
type AccountPayloadManager struct {
logger *zap.Logger
accountPayload *AccountPayload
2022-08-19 12:45:50 +00:00
*PayloadEncryptionManager
accountPayloadMarshaller *AccountPayloadMarshaller
payloadRepository PayloadRepository
2022-06-29 15:21:22 +00:00
}
// NewAccountPayloadManager generates a new and initialised AccountPayloadManager
func NewAccountPayloadManager(aesKey []byte, config *AccountPayloadManagerConfig, logger *zap.Logger) (*AccountPayloadManager, error) {
l := logger.Named("AccountPayloadManager")
2022-10-21 12:15:39 +00:00
l.Debug("fired", zap.Binary("aesKey", aesKey), zap.Any("config", config))
pem, err := NewPayloadEncryptionManager(aesKey, l)
2022-06-29 15:21:22 +00:00
if err != nil {
return nil, err
}
// A new SHARED AccountPayload
p := new(AccountPayload)
return &AccountPayloadManager{
2022-10-21 12:15:39 +00:00
logger: l,
accountPayload: p,
2022-08-19 12:45:50 +00:00
PayloadEncryptionManager: pem,
accountPayloadMarshaller: NewPairingPayloadMarshaller(p, l),
payloadRepository: NewAccountPayloadRepository(p, config),
2022-06-29 15:21:22 +00:00
}, nil
}
// Mount loads and prepares the payload to be stored in the AccountPayloadManager's state ready for later access
func (apm *AccountPayloadManager) Mount() error {
l := apm.logger.Named("Mount()")
2022-10-21 12:15:39 +00:00
l.Debug("fired")
err := apm.payloadRepository.LoadFromSource()
2022-07-01 15:37:53 +00:00
if err != nil {
return err
}
2022-10-21 12:15:39 +00:00
l.Debug("after LoadFromSource")
2022-07-01 15:37:53 +00:00
pb, err := apm.accountPayloadMarshaller.MarshalToProtobuf()
2022-07-01 15:37:53 +00:00
if err != nil {
return err
}
2022-10-21 12:15:39 +00:00
l.Debug(
"after MarshalToProtobuf",
zap.Any("accountPayloadMarshaller.accountPayloadMarshaller.keys", apm.accountPayloadMarshaller.keys),
zap.Any("accountPayloadMarshaller.accountPayloadMarshaller.multiaccount", apm.accountPayloadMarshaller.multiaccount),
zap.String("accountPayloadMarshaller.accountPayloadMarshaller.password", apm.accountPayloadMarshaller.password),
2022-10-21 12:15:39 +00:00
zap.Binary("pb", pb),
)
2022-10-17 09:25:57 +00:00
return apm.Encrypt(pb)
2022-07-01 15:37:53 +00:00
}
// Receive takes a []byte representing raw data, parses and stores the data
func (apm *AccountPayloadManager) Receive(data []byte) error {
l := apm.logger.Named("Receive()")
2022-10-21 12:15:39 +00:00
l.Debug("fired")
err := apm.Decrypt(data)
2022-07-01 15:37:53 +00:00
if err != nil {
return err
}
2022-10-21 12:15:39 +00:00
l.Debug("after Decrypt")
2022-07-01 15:37:53 +00:00
err = apm.accountPayloadMarshaller.UnmarshalProtobuf(apm.Received())
2022-07-01 15:37:53 +00:00
if err != nil {
return err
}
2022-10-21 12:15:39 +00:00
l.Debug(
"after UnmarshalProtobuf",
zap.Any("accountPayloadMarshaller.accountPayloadMarshaller.keys", apm.accountPayloadMarshaller.keys),
zap.Any("accountPayloadMarshaller.accountPayloadMarshaller.multiaccount", apm.accountPayloadMarshaller.multiaccount),
zap.String("accountPayloadMarshaller.accountPayloadMarshaller.password", apm.accountPayloadMarshaller.password),
zap.Binary("accountPayloadMarshaller.Received()", apm.Received()),
2022-10-21 12:15:39 +00:00
)
2022-07-01 15:37:53 +00:00
return apm.payloadRepository.StoreToSource()
2022-07-01 15:37:53 +00:00
}
// ResetPayload resets all payload state managed by the AccountPayloadManager
func (apm *AccountPayloadManager) ResetPayload() {
apm.accountPayload.ResetPayload()
apm.PayloadEncryptionManager.ResetPayload()
}
2022-07-01 15:37:53 +00:00
// EncryptionPayload represents the plain text and encrypted text of payload data
2022-06-29 15:21:22 +00:00
type EncryptionPayload struct {
plain []byte
encrypted []byte
locked bool
}
func (ep *EncryptionPayload) lock() {
ep.locked = true
}
2022-07-01 15:37:53 +00:00
// PayloadEncryptionManager is responsible for encrypting and decrypting payload data
2022-06-29 15:21:22 +00:00
type PayloadEncryptionManager struct {
2022-10-21 12:15:39 +00:00
logger *zap.Logger
aesKey []byte
2022-06-29 15:21:22 +00:00
toSend *EncryptionPayload
received *EncryptionPayload
}
2022-10-21 12:15:39 +00:00
func NewPayloadEncryptionManager(aesKey []byte, logger *zap.Logger) (*PayloadEncryptionManager, error) {
return &PayloadEncryptionManager{logger.Named("PayloadEncryptionManager"), aesKey, new(EncryptionPayload), new(EncryptionPayload)}, nil
}
// EncryptPlain encrypts any given plain text using the internal AES key and returns the encrypted value
// This function is different to Encrypt as the internal EncryptionPayload.encrypted value is not set
2022-08-19 12:45:50 +00:00
func (pem *PayloadEncryptionManager) EncryptPlain(plaintext []byte) ([]byte, error) {
2022-10-21 12:15:39 +00:00
l := pem.logger.Named("EncryptPlain()")
l.Debug("fired")
2022-08-19 12:45:50 +00:00
return common.Encrypt(plaintext, pem.aesKey, rand.Reader)
}
2022-07-01 15:37:53 +00:00
func (pem *PayloadEncryptionManager) Encrypt(data []byte) error {
2022-10-21 12:15:39 +00:00
l := pem.logger.Named("Encrypt()")
l.Debug("fired")
2022-06-29 15:21:22 +00:00
ep, err := common.Encrypt(data, pem.aesKey, rand.Reader)
if err != nil {
return err
}
2022-06-29 15:21:22 +00:00
pem.toSend.plain = data
pem.toSend.encrypted = ep
2022-10-21 12:15:39 +00:00
l.Debug(
"after common.Encrypt",
zap.Binary("data", data),
zap.Binary("pem.aesKey", pem.aesKey),
zap.Binary("ep", ep),
)
return nil
}
2022-07-01 15:37:53 +00:00
func (pem *PayloadEncryptionManager) Decrypt(data []byte) error {
2022-10-21 12:15:39 +00:00
l := pem.logger.Named("Decrypt()")
l.Debug("fired")
2022-06-29 15:21:22 +00:00
pd, err := common.Decrypt(data, pem.aesKey)
2022-10-21 12:15:39 +00:00
l.Debug(
"after common.Decrypt(data, pem.aesKey)",
zap.Binary("data", data),
zap.Binary("pem.aesKey", pem.aesKey),
zap.Binary("pd", pd),
zap.Error(err),
)
if err != nil {
return err
}
2022-06-29 15:21:22 +00:00
pem.received.encrypted = data
pem.received.plain = pd
return nil
}
2022-06-29 15:21:22 +00:00
func (pem *PayloadEncryptionManager) ToSend() []byte {
if pem.toSend.locked {
return nil
}
2022-06-29 15:21:22 +00:00
return pem.toSend.encrypted
}
2022-06-29 15:21:22 +00:00
func (pem *PayloadEncryptionManager) Received() []byte {
if pem.toSend.locked {
return nil
}
2022-06-29 15:21:22 +00:00
return pem.received.plain
}
2022-06-29 15:21:22 +00:00
func (pem *PayloadEncryptionManager) ResetPayload() {
pem.toSend = new(EncryptionPayload)
pem.received = new(EncryptionPayload)
}
func (pem *PayloadEncryptionManager) LockPayload() {
l := pem.logger.Named("LockPayload")
l.Debug("fired")
pem.toSend.lock()
pem.received.lock()
}
// AccountPayload represents the payload structure a Server handles
type AccountPayload struct {
keys map[string][]byte
multiaccount *multiaccounts.Account
password string
}
func (ap *AccountPayload) ResetPayload() {
*ap = AccountPayload{}
}
// AccountPayloadMarshaller is responsible for marshalling and unmarshalling Server payload data
type AccountPayloadMarshaller struct {
2022-10-21 12:15:39 +00:00
logger *zap.Logger
*AccountPayload
2022-06-29 15:21:22 +00:00
}
func NewPairingPayloadMarshaller(ap *AccountPayload, logger *zap.Logger) *AccountPayloadMarshaller {
return &AccountPayloadMarshaller{logger: logger, AccountPayload: ap}
2022-07-01 15:37:53 +00:00
}
func (ppm *AccountPayloadMarshaller) MarshalToProtobuf() ([]byte, error) {
2022-06-29 15:21:22 +00:00
return proto.Marshal(&protobuf.LocalPairingPayload{
Keys: ppm.accountKeysToProtobuf(),
Multiaccount: ppm.multiaccount.ToProtobuf(),
2022-06-29 15:21:22 +00:00
Password: ppm.password,
})
}
func (ppm *AccountPayloadMarshaller) accountKeysToProtobuf() []*protobuf.LocalPairingPayload_Key {
2022-06-29 15:21:22 +00:00
var keys []*protobuf.LocalPairingPayload_Key
for name, data := range ppm.keys {
keys = append(keys, &protobuf.LocalPairingPayload_Key{Name: name, Data: data})
}
return keys
}
func (ppm *AccountPayloadMarshaller) UnmarshalProtobuf(data []byte) error {
2022-10-21 12:15:39 +00:00
l := ppm.logger.Named("UnmarshalProtobuf()")
l.Debug("fired")
2022-06-29 15:21:22 +00:00
pb := new(protobuf.LocalPairingPayload)
err := proto.Unmarshal(data, pb)
2022-10-21 12:15:39 +00:00
l.Debug(
"after protobuf.LocalPairingPayload",
zap.Any("pb", pb),
zap.Any("pb.Multiaccount", pb.Multiaccount),
zap.Any("pb.Keys", pb.Keys),
)
if err != nil {
return err
}
2022-06-29 15:21:22 +00:00
ppm.accountKeysFromProtobuf(pb.Keys)
ppm.multiaccountFromProtobuf(pb.Multiaccount)
ppm.password = pb.Password
return nil
}
func (ppm *AccountPayloadMarshaller) accountKeysFromProtobuf(pbKeys []*protobuf.LocalPairingPayload_Key) {
2022-10-21 12:15:39 +00:00
l := ppm.logger.Named("accountKeysFromProtobuf()")
l.Debug("fired")
2022-06-29 15:21:22 +00:00
if ppm.keys == nil {
ppm.keys = make(map[string][]byte)
}
for _, key := range pbKeys {
ppm.keys[key.Name] = key.Data
}
2022-10-21 12:15:39 +00:00
l.Debug(
"after for _, key := range pbKeys",
zap.Any("pbKeys", pbKeys),
zap.Any("accountPayloadMarshaller.keys", ppm.keys),
2022-10-21 12:15:39 +00:00
)
2022-06-29 15:21:22 +00:00
}
func (ppm *AccountPayloadMarshaller) multiaccountFromProtobuf(pbMultiAccount *protobuf.MultiAccount) {
ppm.multiaccount = new(multiaccounts.Account)
ppm.multiaccount.FromProtobuf(pbMultiAccount)
2022-06-29 15:21:22 +00:00
}
2022-07-01 15:37:53 +00:00
type PayloadRepository interface {
LoadFromSource() error
StoreToSource() error
}
// AccountPayloadRepository is responsible for loading, parsing, validating and storing Server payload data
type AccountPayloadRepository struct {
*AccountPayload
2022-06-29 15:21:22 +00:00
multiaccountsDB *multiaccounts.Database
2022-07-01 15:37:53 +00:00
keystorePath, keyUID string
2022-06-29 15:21:22 +00:00
}
func NewAccountPayloadRepository(p *AccountPayload, config *AccountPayloadManagerConfig) *AccountPayloadRepository {
ppr := &AccountPayloadRepository{
AccountPayload: p,
2022-06-29 15:21:22 +00:00
}
2022-07-01 15:37:53 +00:00
if config == nil {
return ppr
}
ppr.multiaccountsDB = config.DB
ppr.keystorePath = config.KeystorePath
ppr.keyUID = config.KeyUID
ppr.password = config.Password
return ppr
2022-06-29 15:21:22 +00:00
}
func (apr *AccountPayloadRepository) LoadFromSource() error {
err := apr.loadKeys(apr.keystorePath)
if err != nil {
return err
}
2022-06-29 15:21:22 +00:00
err = apr.validateKeys(apr.password)
2022-06-29 15:21:22 +00:00
if err != nil {
return err
}
apr.multiaccount, err = apr.multiaccountsDB.GetAccount(apr.keyUID)
2022-06-29 15:21:22 +00:00
if err != nil {
return err
}
return nil
}
func (apr *AccountPayloadRepository) loadKeys(keyStorePath string) error {
apr.keys = make(map[string][]byte)
fileWalker := func(path string, fileInfo os.FileInfo, err error) error {
if err != nil {
return err
}
if fileInfo.IsDir() || filepath.Dir(path) != keyStorePath {
return nil
}
rawKeyFile, err := ioutil.ReadFile(path)
if err != nil {
return fmt.Errorf("invalid account key file: %v", err)
}
accountKey := new(keystore.EncryptedKeyJSONV3)
if err := json.Unmarshal(rawKeyFile, &accountKey); err != nil {
return fmt.Errorf("failed to read key file: %s", err)
}
if len(accountKey.Address) != 40 {
return fmt.Errorf("account key address has invalid length '%s'", accountKey.Address)
}
apr.keys[fileInfo.Name()] = rawKeyFile
return nil
}
err := filepath.Walk(keyStorePath, fileWalker)
if err != nil {
return fmt.Errorf("cannot traverse key store folder: %v", err)
}
return nil
}
func (apr *AccountPayloadRepository) StoreToSource() error {
err := apr.validateKeys(apr.password)
2022-06-24 23:09:01 +00:00
if err != nil {
return err
}
err = apr.storeKeys(apr.keystorePath)
2022-06-24 23:09:01 +00:00
if err != nil {
return err
}
err = apr.storeMultiAccount()
2022-06-24 23:09:01 +00:00
if err != nil {
return err
}
2022-06-29 15:21:22 +00:00
// TODO install PublicKey into settings, probably do this outside of StoreToSource
2022-06-24 23:09:01 +00:00
return nil
}
func (apr *AccountPayloadRepository) validateKeys(password string) error {
for _, key := range apr.keys {
2022-06-24 23:09:01 +00:00
k, err := keystore.DecryptKey(key, password)
if err != nil {
return err
}
err = generator.ValidateKeystoreExtendedKey(k)
if err != nil {
return err
}
}
return nil
}
func (apr *AccountPayloadRepository) storeKeys(keyStorePath string) error {
if keyStorePath == "" {
return fmt.Errorf("keyStorePath can not be empty")
}
_, lastDir := filepath.Split(keyStorePath)
// If lastDir == "keystore" we presume we need to create the rest of the keystore path
// else we presume the provided keystore is valid
if lastDir == "keystore" {
if apr.multiaccount == nil || apr.multiaccount.KeyUID == "" {
return fmt.Errorf("no known Key UID")
}
keyStorePath = filepath.Join(keyStorePath, apr.multiaccount.KeyUID)
_, err := os.Stat(keyStorePath)
if os.IsNotExist(err) {
err := os.MkdirAll(keyStorePath, 0777)
if err != nil {
return err
}
} else if err != nil {
return err
} else {
return ErrKeyFileAlreadyExists
}
}
for name, data := range apr.keys {
2022-06-24 23:09:01 +00:00
accountKey := new(keystore.EncryptedKeyJSONV3)
if err := json.Unmarshal(data, &accountKey); err != nil {
return fmt.Errorf("failed to read key file: %s", err)
}
if len(accountKey.Address) != 40 {
return fmt.Errorf("account key address has invalid length '%s'", accountKey.Address)
}
err := ioutil.WriteFile(filepath.Join(keyStorePath, name), data, 0600)
if err != nil {
return err
}
}
return nil
}
func (apr *AccountPayloadRepository) storeMultiAccount() error {
return apr.multiaccountsDB.SaveAccount(*apr.multiaccount)
}
type RawMessagePayloadManager struct {
logger *zap.Logger
// reference from AccountPayloadManager#accountPayload
accountPayload *AccountPayload
*PayloadEncryptionManager
payloadRepository *RawMessageRepository
}
func NewRawMessagePayloadManager(logger *zap.Logger, accountPayload *AccountPayload, aesKey []byte, backend *api.GethStatusBackend, keystorePath string) (*RawMessagePayloadManager, error) {
l := logger.Named("RawMessagePayloadManager")
pem, err := NewPayloadEncryptionManager(aesKey, l)
if err != nil {
return nil, err
}
return &RawMessagePayloadManager{
logger: l,
accountPayload: accountPayload,
PayloadEncryptionManager: pem,
payloadRepository: NewRawMessageRepository(backend, keystorePath, accountPayload),
}, nil
}
func (r *RawMessagePayloadManager) Mount() error {
err := r.payloadRepository.LoadFromSource()
if err != nil {
return err
}
return r.Encrypt(r.payloadRepository.payload)
}
func (r *RawMessagePayloadManager) Receive(data []byte) error {
err := r.Decrypt(data)
if err != nil {
return err
}
r.payloadRepository.payload = r.Received()
return r.payloadRepository.StoreToSource()
}
func (r *RawMessagePayloadManager) ResetPayload() {
r.payloadRepository.payload = make([]byte, 0)
r.PayloadEncryptionManager.ResetPayload()
}
type RawMessageRepository struct {
payload []byte
syncRawMessageHandler *SyncRawMessageHandler
keystorePath string
accountPayload *AccountPayload
}
func NewRawMessageRepository(backend *api.GethStatusBackend, keystorePath string, accountPayload *AccountPayload) *RawMessageRepository {
return &RawMessageRepository{
syncRawMessageHandler: NewSyncRawMessageHandler(backend),
keystorePath: keystorePath,
payload: make([]byte, 0),
accountPayload: accountPayload,
}
}
func (r *RawMessageRepository) LoadFromSource() error {
account := r.accountPayload.multiaccount
if account == nil || account.KeyUID == "" {
return fmt.Errorf("no known KeyUID when loading raw messages")
}
payload, err := r.syncRawMessageHandler.PrepareRawMessage(account.KeyUID)
if err != nil {
return err
}
r.payload = payload
return nil
}
func (r *RawMessageRepository) StoreToSource() error {
accountPayload := r.accountPayload
if accountPayload == nil || accountPayload.multiaccount == nil {
return fmt.Errorf("no known multiaccount when storing raw messages")
}
return r.syncRawMessageHandler.HandleRawMessage(accountPayload.multiaccount, accountPayload.password, r.keystorePath, r.payload)
}