api.go 7.24 KB
Newer Older
1
2
3
4
package backend

import (
	"encoding/json"
5
	"io/ioutil"
6
	"net/http"
7
	"path/filepath"
8
	"regexp"
9
	"strings"
10
11
12

	"github.com/Sirupsen/logrus"
	"github.com/go-errors/errors"
13
14
	"github.com/privacybydesign/gabi"
	"github.com/privacybydesign/gabi/big"
15
	"github.com/privacybydesign/irmago"
Sietse Ringers's avatar
Sietse Ringers committed
16
	"github.com/privacybydesign/irmago/server"
17
18
)

Sietse Ringers's avatar
Sietse Ringers committed
19
func Initialize(configuration *server.Configuration) error {
20
21
22
23
24
25
26
	conf = configuration

	if conf.Logger == nil {
		conf.Logger = logrus.New()
		conf.Logger.Level = logrus.DebugLevel
		conf.Logger.Formatter = &logrus.TextFormatter{}
	}
Sietse Ringers's avatar
Sietse Ringers committed
27
	server.Logger = conf.Logger
28
29
30
31
32
33
34
35
36
37
38
39

	if conf.IrmaConfiguration == nil {
		var err error
		conf.IrmaConfiguration, err = irma.NewConfiguration(conf.IrmaConfigurationPath, "")
		if err != nil {
			return err
		}
		if err = conf.IrmaConfiguration.ParseFolder(); err != nil {
			return err
		}
	}

40
41
	if conf.IssuerPrivateKeys == nil {
		conf.IssuerPrivateKeys = make(map[irma.IssuerIdentifier]*gabi.PrivateKey)
42
	}
43
44
	if conf.IssuerPrivateKeysPath != "" {
		files, err := ioutil.ReadDir(conf.IssuerPrivateKeysPath)
45
46
47
48
49
50
51
52
53
		if err != nil {
			return err
		}
		for _, file := range files {
			filename := file.Name()
			issid := irma.NewIssuerIdentifier(strings.TrimSuffix(filename, filepath.Ext(filename))) // strip .xml
			if _, ok := conf.IrmaConfiguration.Issuers[issid]; !ok {
				return errors.Errorf("Private key %s belongs to an unknown issuer", filename)
			}
54
			sk, err := gabi.NewPrivateKeyFromFile(filepath.Join(conf.IssuerPrivateKeysPath, filename))
55
56
57
			if err != nil {
				return err
			}
58
			conf.IssuerPrivateKeys[issid] = sk
59
60
		}
	}
61
	for issid, sk := range conf.IssuerPrivateKeys {
62
63
64
65
66
67
68
69
70
71
72
73
		pk, err := conf.IrmaConfiguration.PublicKey(issid, int(sk.Counter))
		if err != nil {
			return err
		}
		if pk == nil {
			return errors.Errorf("Missing public key belonging to private key %s-%d", issid.String(), sk.Counter)
		}
		if new(big.Int).Mul(sk.P, sk.Q).Cmp(pk.N) != 0 {
			return errors.Errorf("Private key %s-%d does not belong to corresponding public key", issid.String(), sk.Counter)
		}
	}

74
75
76
77
78
79
80
81
	if conf.Url != "" {
		if !strings.HasSuffix(conf.Url, "/") {
			conf.Url = conf.Url + "/"
		}
	} else {
		conf.Logger.Warn("No url parameter specified in configuration; unless an url is elsewhere prepended in the QR, the IRMA client will not be able to connect")
	}

82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
	return nil
}

func StartSession(request irma.SessionRequest) (*irma.Qr, string, error) {
	if err := request.Validate(); err != nil {
		return nil, "", err
	}
	action := irma.ActionUnknown
	switch request.(type) {
	case *irma.DisclosureRequest:
		action = irma.ActionDisclosing
	case *irma.SignatureRequest:
		action = irma.ActionSigning
	case *irma.IssuanceRequest:
		action = irma.ActionIssuing
		if err := validateIssuanceRequest(request.(*irma.IssuanceRequest)); err != nil {
			return nil, "", err
		}
	default:
		conf.Logger.Warnf("Attempt to start session of invalid type")
		return nil, "", errors.New("Invalid session type")
	}

	session := newSession(action, request)
	conf.Logger.Infof("%s session started, token %s", action, session.token)
	return &irma.Qr{
		Type: action,
109
		URL:  conf.Url + session.token,
110
111
112
	}, session.token, nil
}

Sietse Ringers's avatar
Sietse Ringers committed
113
func GetSessionResult(token string) *server.SessionResult {
Sietse Ringers's avatar
Sietse Ringers committed
114
	session := sessions.get(token)
115
	if session == nil {
Sietse Ringers's avatar
Sietse Ringers committed
116
117
118
119
120
		return nil
	}
	return session.result
}

121
122
123
124
125
126
127
128
129
func CancelSession(token string) error {
	session := sessions.get(token)
	if session == nil {
		return errors.New("Unknown session, can't cancel")
	}
	session.handleDelete()
	return nil
}

130
131
132
133
134
func HandleProtocolMessage(
	path string,
	method string,
	headers map[string][]string,
	message []byte,
Sietse Ringers's avatar
Sietse Ringers committed
135
) (status int, output []byte, result *server.SessionResult) {
136
137
138
139
140
141
142
143
144
145
146
147
148
149
	// Parse path into session and action
	if len(path) > 0 { // Remove any starting and trailing slash
		if path[0] == '/' {
			path = path[1:]
		}
		if path[len(path)-1] == '/' {
			path = path[:len(path)-1]
		}
	}
	conf.Logger.Debugf("Routing protocol message: %s %s", method, path)
	pattern := regexp.MustCompile("(\\w+)/?(\\w*)")
	matches := pattern.FindStringSubmatch(path)
	if len(matches) != 3 {
		conf.Logger.Warnf("Invalid URL: %s", path)
Sietse Ringers's avatar
Sietse Ringers committed
150
		status, output = server.JsonResponse(nil, server.RemoteError(server.ErrorInvalidRequest, ""))
151
		return
152
153
	}

Sietse Ringers's avatar
Sietse Ringers committed
154
	// Fetch the session
155
	token := matches[1]
156
	noun := matches[2]
157
158
159
	session := sessions.get(token)
	if session == nil {
		conf.Logger.Warnf("Session not found: %s", token)
Sietse Ringers's avatar
Sietse Ringers committed
160
		status, output = server.JsonResponse(nil, server.RemoteError(server.ErrorSessionUnknown, ""))
161
		return
162
	}
163
164
	session.Lock()
	defer session.Unlock()
165

166
	// However we return, if the session has been finished or cancelled by any of the handlers
167
168
	// then we should inform the user by returning a SessionResult - but only if we have not
	// already done this in the past, e.g. by a previous HTTP call handled by this function
169
	defer func() {
170
171
		if session.finished() && !session.returned {
			session.returned = true
172
173
			result = session.result
		}
174
		sessions.update(token, session)
175
176
	}()

177
	// Route to handler
178
	switch len(noun) {
179
	case 0:
180
		if method == http.MethodDelete {
181
182
183
			session.handleDelete()
			status = http.StatusOK
			return
184
		}
185
		if method == http.MethodGet {
186
187
188
189
			h := http.Header(headers)
			min := &irma.ProtocolVersion{}
			max := &irma.ProtocolVersion{}
			if err := json.Unmarshal([]byte(h.Get(irma.MinVersionHeader)), min); err != nil {
Sietse Ringers's avatar
Sietse Ringers committed
190
				status, output = server.JsonResponse(nil, session.fail(server.ErrorMalformedInput, err.Error()))
191
				return
192
193
			}
			if err := json.Unmarshal([]byte(h.Get(irma.MaxVersionHeader)), max); err != nil {
Sietse Ringers's avatar
Sietse Ringers committed
194
				status, output = server.JsonResponse(nil, session.fail(server.ErrorMalformedInput, err.Error()))
195
				return
196
			}
Sietse Ringers's avatar
Sietse Ringers committed
197
			status, output = server.JsonResponse(session.handleGetRequest(min, max))
198
			return
199
		}
Sietse Ringers's avatar
Sietse Ringers committed
200
		status, output = server.JsonResponse(nil, session.fail(server.ErrorInvalidRequest, ""))
201
		return
202
	default:
203
204
		if method == http.MethodGet && noun == "status" {
			status, output = server.JsonResponse(session.handleGetStatus())
Sietse Ringers's avatar
Sietse Ringers committed
205
			return
206
207
208
		}

		// Below are only POST enpoints
209
		if method != http.MethodPost {
Sietse Ringers's avatar
Sietse Ringers committed
210
			status, output = server.JsonResponse(nil, session.fail(server.ErrorInvalidRequest, ""))
Sietse Ringers's avatar
Sietse Ringers committed
211
212
213
			return
		}

214
		if noun == "commitments" && session.action == irma.ActionIssuing {
Sietse Ringers's avatar
Sietse Ringers committed
215
			commitments := &irma.IssueCommitmentMessage{}
Sietse Ringers's avatar
Sietse Ringers committed
216
			if err := irma.UnmarshalValidate(message, commitments); err != nil {
Sietse Ringers's avatar
Sietse Ringers committed
217
				status, output = server.JsonResponse(nil, session.fail(server.ErrorMalformedInput, ""))
218
				return
219
			}
Sietse Ringers's avatar
Sietse Ringers committed
220
			status, output = server.JsonResponse(session.handlePostCommitments(commitments))
Sietse Ringers's avatar
Sietse Ringers committed
221
222
			return
		}
223
		if noun == "proofs" && session.action == irma.ActionDisclosing {
Sietse Ringers's avatar
Sietse Ringers committed
224
225
			disclosure := irma.Disclosure{}
			if err := irma.UnmarshalValidate(message, &disclosure); err != nil {
Sietse Ringers's avatar
Sietse Ringers committed
226
				status, output = server.JsonResponse(nil, session.fail(server.ErrorMalformedInput, ""))
227
				return
228
			}
Sietse Ringers's avatar
Sietse Ringers committed
229
			status, output = server.JsonResponse(session.handlePostDisclosure(disclosure))
Sietse Ringers's avatar
Sietse Ringers committed
230
231
			return
		}
232
		if noun == "proofs" && session.action == irma.ActionSigning {
Sietse Ringers's avatar
Sietse Ringers committed
233
234
			signature := &irma.SignedMessage{}
			if err := irma.UnmarshalValidate(message, signature); err != nil {
Sietse Ringers's avatar
Sietse Ringers committed
235
				status, output = server.JsonResponse(nil, session.fail(server.ErrorMalformedInput, ""))
236
				return
237
			}
Sietse Ringers's avatar
Sietse Ringers committed
238
			status, output = server.JsonResponse(session.handlePostSignature(signature))
239
			return
240
		}
Sietse Ringers's avatar
Sietse Ringers committed
241

Sietse Ringers's avatar
Sietse Ringers committed
242
		status, output = server.JsonResponse(nil, session.fail(server.ErrorInvalidRequest, ""))
243
		return
244
245
	}
}