store.go 5.38 KB
Newer Older
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
package irmago

import (
	"crypto/sha256"
	"encoding/base64"
	"encoding/xml"
	"io/ioutil"
	"os"
	"path/filepath"
	"strconv"

	"github.com/mhe/gabi"
)

// ConfigurationStore keeps track of scheme managers, issuers, credential types and public keys.
type ConfigurationStore struct {
17
18
	SchemeManagers map[SchemeManagerIdentifier]*SchemeManager
	Issuers        map[IssuerIdentifier]*Issuer
19
	Credentials    map[CredentialTypeIdentifier]*CredentialType
20

21
	publicKeys    map[IssuerIdentifier][]*gabi.PublicKey
22
	reverseHashes map[string]CredentialTypeIdentifier
23
	path          string
24
	initialized   bool
25
26
}

Sietse Ringers's avatar
Sietse Ringers committed
27
func NewConfigurationStore() (store *ConfigurationStore) {
28
	store = &ConfigurationStore{
29
30
		SchemeManagers: make(map[SchemeManagerIdentifier]*SchemeManager),
		Issuers:        make(map[IssuerIdentifier]*Issuer),
31
		Credentials:    make(map[CredentialTypeIdentifier]*CredentialType),
32
		publicKeys:     make(map[IssuerIdentifier][]*gabi.PublicKey),
33
		reverseHashes:  make(map[string]CredentialTypeIdentifier),
34
35
36
37
38
	}
	return
}

// PublicKey returns the specified public key, or nil if not present in the ConfigurationStore.
39
40
41
42
43
44
func (store *ConfigurationStore) PublicKey(id IssuerIdentifier, counter int) (*gabi.PublicKey, error) {
	if _, contains := store.publicKeys[id]; !contains {
		store.publicKeys[id] = []*gabi.PublicKey{}
		err := store.parseKeysFolder(id)
		if err != nil {
			return nil, err
45
46
		}
	}
47
48
49
50
51
52
53

	list := store.publicKeys[id]
	if len(list) > counter {
		return list[counter], nil
	}

	return nil, nil
54
55
}

56
func (store *ConfigurationStore) addReverseHash(credid CredentialTypeIdentifier) {
57
	hash := sha256.Sum256([]byte(credid.String()))
58
59
60
61
62
63
64
65
66
67
	store.reverseHashes[base64.StdEncoding.EncodeToString(hash[:16])] = credid
}

func (store *ConfigurationStore) hashToCredentialType(hash []byte) *CredentialType {
	if str, exists := store.reverseHashes[base64.StdEncoding.EncodeToString(hash)]; exists {
		return store.Credentials[str]
	}
	return nil
}

68
// IsInitialized indicates whether this instance has successfully been initialized.
69
70
71
72
func (store *ConfigurationStore) IsInitialized() bool {
	return store.initialized
}

73
74
75
// ParseFolder populates the current store by parsing the specified irma_configuration folder,
// listing the containing scheme managers, issuers, credential types and public keys.
func (store *ConfigurationStore) ParseFolder(path string) error {
76
	store.path = path
77
	err := iterateSubfolders(path, func(dir string) error {
78
79
80
81
82
83
		manager := &SchemeManager{}
		exists, err := pathToDescription(dir+"/description.xml", manager)
		if err != nil {
			return err
		}
		if exists {
Sietse Ringers's avatar
Sietse Ringers committed
84
			store.SchemeManagers[manager.Identifier()] = manager
85
86
87
88
			return store.parseIssuerFolders(dir)
		}
		return nil
	})
89
90
91
92
93
	if err != nil {
		return err
	}
	store.initialized = true
	return nil
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
}

func (store *ConfigurationStore) parseIssuerFolders(path string) error {
	return iterateSubfolders(path, func(dir string) error {
		issuer := &Issuer{}
		exists, err := pathToDescription(dir+"/description.xml", issuer)
		if err != nil {
			return err
		}
		if exists {
			store.Issuers[issuer.Identifier()] = issuer
			if err = store.parseCredentialsFolder(dir + "/Issues/"); err != nil {
				return err
			}
		}
		return nil
	})
}

113
114
115
116
117
118
func (store *ConfigurationStore) parseKeysFolder(issuerid IssuerIdentifier) error {
	issuer := store.Issuers[issuerid]
	path := store.path + "/" +
		issuer.Identifier().SchemeManagerIdentifier().String() +
		"/" + issuer.ID + "/PublicKeys/"

119
120
121
122
123
124
125
126
127
	for i := 0; ; i++ {
		file := path + strconv.Itoa(i) + ".xml"
		if _, err := os.Stat(file); err != nil {
			break
		}
		pk, err := gabi.NewPublicKeyFromFile(file)
		if err != nil {
			return err
		}
Sietse Ringers's avatar
Sietse Ringers committed
128
		pk.Issuer = issuer.Identifier().String()
129
		store.publicKeys[issuer.Identifier()] = append(store.publicKeys[issuer.Identifier()], pk)
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
	}
	return nil
}

func (store *ConfigurationStore) parseCredentialsFolder(path string) error {
	return iterateSubfolders(path, func(dir string) error {
		cred := &CredentialType{}
		exists, err := pathToDescription(dir+"/description.xml", cred)
		if err != nil {
			return err
		}
		if exists {
			credid := cred.Identifier()
			store.Credentials[credid] = cred
			store.addReverseHash(credid)
		}
		return nil
	})
}

// iterateSubfolders iterates over the subfolders of the specified path,
// calling the specified handler each time. If anything goes wrong, or
// if the caller returns a non-nil error, an error is immediately returned.
func iterateSubfolders(path string, handler func(string) error) error {
	dirs, err := filepath.Glob(path + "/*")
	if err != nil {
		return err
	}

	for _, dir := range dirs {
		stat, err := os.Stat(dir)
		if err != nil {
			return err
		}
		if !stat.IsDir() {
			continue
		}
		err = handler(dir)
		if err != nil {
			return err
		}
	}

	return nil
}

func pathToDescription(path string, description interface{}) (bool, error) {
	if _, err := os.Stat(path); err != nil {
		return false, nil
	}

	file, err := os.Open(path)
	if err != nil {
		return true, err
	}
	defer file.Close()

	bytes, err := ioutil.ReadAll(file)
	if err != nil {
		return true, err
	}

	err = xml.Unmarshal(bytes, description)
	if err != nil {
		return true, err
	}

	return true, nil
}
199

Sietse Ringers's avatar
Sietse Ringers committed
200
// Contains checks if the store contains the specified credential type.
201
202
203
204
205
func (store *ConfigurationStore) Contains(cred CredentialTypeIdentifier) bool {
	return store.SchemeManagers[cred.IssuerIdentifier().SchemeManagerIdentifier()] != nil &&
		store.Issuers[cred.IssuerIdentifier()] != nil &&
		store.Credentials[cred] != nil
}