api.go 8.77 KB
Newer Older
1
2
3
4
// Package core is the core of the IRMA server library, allowing IRMA verifiers, issuers
// or attribute-based signature applications to perform IRMA sessions with irmaclient instances
// (i.e. the IRMA app). It exposes a small interface to expose to other programming languages
// through cgo. It is used by the irmarequestor package but otherwise not meant for use in Go.
5
package core
6
7
8

import (
	"encoding/json"
9
	"io/ioutil"
10
	"net/http"
11
	"path/filepath"
12
	"regexp"
13
	"strings"
14
15
16

	"github.com/Sirupsen/logrus"
	"github.com/go-errors/errors"
17
18
	"github.com/privacybydesign/gabi"
	"github.com/privacybydesign/gabi/big"
19
	"github.com/privacybydesign/irmago"
Sietse Ringers's avatar
Sietse Ringers committed
20
	"github.com/privacybydesign/irmago/server"
21
22
)

Sietse Ringers's avatar
Sietse Ringers committed
23
func Initialize(configuration *server.Configuration) error {
24
25
26
27
28
29
30
	conf = configuration

	if conf.Logger == nil {
		conf.Logger = logrus.New()
		conf.Logger.Level = logrus.DebugLevel
		conf.Logger.Formatter = &logrus.TextFormatter{}
	}
Sietse Ringers's avatar
Sietse Ringers committed
31
	server.Logger = conf.Logger
Sietse Ringers's avatar
Sietse Ringers committed
32
	irma.Logger = conf.Logger
33
34
35

	if conf.IrmaConfiguration == nil {
		var err error
36
		if conf.CachePath == "" {
37
			conf.IrmaConfiguration, err = irma.NewConfiguration(conf.IrmaConfigurationPath)
38
		} else {
39
40
41
42
			conf.IrmaConfiguration, err = irma.NewConfigurationFromAssets(
				filepath.Join(conf.CachePath, "irma_configuration"),
				conf.IrmaConfigurationPath,
			)
43
		}
44
		if err != nil {
45
			return server.LogError(err)
46
		}
47
		if err = conf.IrmaConfiguration.ParseFolder(); err != nil {
48
			return server.LogError(err)
49
50
51
52
53
		}
	}

	if len(conf.IrmaConfiguration.SchemeManagers) == 0 {
		if conf.DownloadDefaultSchemes {
54
			if err := conf.IrmaConfiguration.DownloadDefaultSchemes(); err != nil {
55
				return server.LogError(err)
56
			}
57
		} else {
58
			return server.LogError(errors.New("no schemes found in irma_configuration folder " + conf.IrmaConfiguration.Path))
59
		}
60
61
	}

62
63
	if conf.IssuerPrivateKeys == nil {
		conf.IssuerPrivateKeys = make(map[irma.IssuerIdentifier]*gabi.PrivateKey)
64
	}
65
66
	if conf.IssuerPrivateKeysPath != "" {
		files, err := ioutil.ReadDir(conf.IssuerPrivateKeysPath)
67
		if err != nil {
68
			return server.LogError(err)
69
70
71
72
73
		}
		for _, file := range files {
			filename := file.Name()
			issid := irma.NewIssuerIdentifier(strings.TrimSuffix(filename, filepath.Ext(filename))) // strip .xml
			if _, ok := conf.IrmaConfiguration.Issuers[issid]; !ok {
74
				return server.LogError(errors.Errorf("Private key %s belongs to an unknown issuer", filename))
75
			}
76
			sk, err := gabi.NewPrivateKeyFromFile(filepath.Join(conf.IssuerPrivateKeysPath, filename))
77
			if err != nil {
78
				return server.LogError(err)
79
			}
80
			conf.IssuerPrivateKeys[issid] = sk
81
82
		}
	}
83
	for issid, sk := range conf.IssuerPrivateKeys {
84
85
		pk, err := conf.IrmaConfiguration.PublicKey(issid, int(sk.Counter))
		if err != nil {
86
			return server.LogError(err)
87
88
		}
		if pk == nil {
89
			return server.LogError(errors.Errorf("Missing public key belonging to private key %s-%d", issid.String(), sk.Counter))
90
91
		}
		if new(big.Int).Mul(sk.P, sk.Q).Cmp(pk.N) != 0 {
92
			return server.LogError(errors.Errorf("Private key %s-%d does not belong to corresponding public key", issid.String(), sk.Counter))
93
94
95
		}
	}

96
97
98
	if conf.URL != "" {
		if !strings.HasSuffix(conf.URL, "/") {
			conf.URL = conf.URL + "/"
99
100
101
102
103
		}
	} else {
		conf.Logger.Warn("No url parameter specified in configuration; unless an url is elsewhere prepended in the QR, the IRMA client will not be able to connect")
	}

104
105
106
107
108
	return nil
}

func StartSession(request irma.SessionRequest) (*irma.Qr, string, error) {
	if err := request.Validate(); err != nil {
109
		return nil, "", server.LogError(err)
110
111
112
113
114
115
116
117
118
119
	}
	action := irma.ActionUnknown
	switch request.(type) {
	case *irma.DisclosureRequest:
		action = irma.ActionDisclosing
	case *irma.SignatureRequest:
		action = irma.ActionSigning
	case *irma.IssuanceRequest:
		action = irma.ActionIssuing
		if err := validateIssuanceRequest(request.(*irma.IssuanceRequest)); err != nil {
120
			return nil, "", server.LogError(err)
121
122
		}
	default:
123
		return nil, "", server.LogError(errors.New("Invalid session type"))
124
125
126
127
	}

	session := newSession(action, request)
	conf.Logger.Infof("%s session started, token %s", action, session.token)
128
129
130
131
132
	if conf.Logger.IsLevelEnabled(logrus.DebugLevel) {
		conf.Logger.Debug("Session request: ", server.ToJson(request))
	} else {
		logPurgedRequest(request)
	}
133
134
	return &irma.Qr{
		Type: action,
135
		URL:  conf.URL + session.token,
136
137
138
	}, session.token, nil
}

Sietse Ringers's avatar
Sietse Ringers committed
139
func GetSessionResult(token string) *server.SessionResult {
Sietse Ringers's avatar
Sietse Ringers committed
140
	session := sessions.get(token)
141
	if session == nil {
142
		conf.Logger.Warn("Session result requested of unknown session ", token)
Sietse Ringers's avatar
Sietse Ringers committed
143
144
145
146
147
		return nil
	}
	return session.result
}

148
149
150
func CancelSession(token string) error {
	session := sessions.get(token)
	if session == nil {
151
		return server.LogError(errors.Errorf("can't cancel unknown session %s", token))
152
153
154
155
156
	}
	session.handleDelete()
	return nil
}

157
158
159
160
161
func HandleProtocolMessage(
	path string,
	method string,
	headers map[string][]string,
	message []byte,
Sietse Ringers's avatar
Sietse Ringers committed
162
) (status int, output []byte, result *server.SessionResult) {
163
164
165
166
167
168
169
170
171
	// Parse path into session and action
	if len(path) > 0 { // Remove any starting and trailing slash
		if path[0] == '/' {
			path = path[1:]
		}
		if path[len(path)-1] == '/' {
			path = path[:len(path)-1]
		}
	}
172

173
	conf.Logger.Debugf("Routing protocol message: %s %s", method, path)
174
175
176
177
	if len(message) > 0 {
		conf.Logger.Trace("POST body: ", string(message))
	}
	conf.Logger.Trace("HTTP headers: ", server.ToJson(headers))
178
	pattern := regexp.MustCompile("(\\w+)/?(|commitments|proofs|status)$")
179
180
181
	matches := pattern.FindStringSubmatch(path)
	if len(matches) != 3 {
		conf.Logger.Warnf("Invalid URL: %s", path)
Sietse Ringers's avatar
Sietse Ringers committed
182
		status, output = server.JsonResponse(nil, server.RemoteError(server.ErrorInvalidRequest, ""))
183
		return
184
185
	}

Sietse Ringers's avatar
Sietse Ringers committed
186
	// Fetch the session
187
	token := matches[1]
188
	noun := matches[2]
189
190
191
	session := sessions.get(token)
	if session == nil {
		conf.Logger.Warnf("Session not found: %s", token)
Sietse Ringers's avatar
Sietse Ringers committed
192
		status, output = server.JsonResponse(nil, server.RemoteError(server.ErrorSessionUnknown, ""))
193
		return
194
	}
195
196
	session.Lock()
	defer session.Unlock()
197

198
	// However we return, if the session has been finished or cancelled by any of the handlers
199
200
	// then we should inform the user by returning a SessionResult - but only if we have not
	// already done this in the past, e.g. by a previous HTTP call handled by this function
201
	defer func() {
202
203
		if session.finished() && !session.returned {
			session.returned = true
204
			result = session.result
205
			conf.Logger.Infof("Session %s done, status %s", session.token, session.result.Status)
206
		}
207
		sessions.update(token, session)
208
209
	}()

210
	// Route to handler
211
	switch len(noun) {
212
	case 0:
213
		if method == http.MethodDelete {
214
215
216
			session.handleDelete()
			status = http.StatusOK
			return
217
		}
218
		if method == http.MethodGet {
219
220
221
222
			h := http.Header(headers)
			min := &irma.ProtocolVersion{}
			max := &irma.ProtocolVersion{}
			if err := json.Unmarshal([]byte(h.Get(irma.MinVersionHeader)), min); err != nil {
Sietse Ringers's avatar
Sietse Ringers committed
223
				status, output = server.JsonResponse(nil, session.fail(server.ErrorMalformedInput, err.Error()))
224
				return
225
226
			}
			if err := json.Unmarshal([]byte(h.Get(irma.MaxVersionHeader)), max); err != nil {
Sietse Ringers's avatar
Sietse Ringers committed
227
				status, output = server.JsonResponse(nil, session.fail(server.ErrorMalformedInput, err.Error()))
228
				return
229
			}
Sietse Ringers's avatar
Sietse Ringers committed
230
			status, output = server.JsonResponse(session.handleGetRequest(min, max))
231
			return
232
		}
Sietse Ringers's avatar
Sietse Ringers committed
233
		status, output = server.JsonResponse(nil, session.fail(server.ErrorInvalidRequest, ""))
234
		return
235
	default:
236
237
		if method == http.MethodGet && noun == "status" {
			status, output = server.JsonResponse(session.handleGetStatus())
Sietse Ringers's avatar
Sietse Ringers committed
238
			return
239
240
241
		}

		// Below are only POST enpoints
242
		if method != http.MethodPost {
Sietse Ringers's avatar
Sietse Ringers committed
243
			status, output = server.JsonResponse(nil, session.fail(server.ErrorInvalidRequest, ""))
Sietse Ringers's avatar
Sietse Ringers committed
244
245
246
			return
		}

247
		if noun == "commitments" && session.action == irma.ActionIssuing {
Sietse Ringers's avatar
Sietse Ringers committed
248
			commitments := &irma.IssueCommitmentMessage{}
Sietse Ringers's avatar
Sietse Ringers committed
249
			if err := irma.UnmarshalValidate(message, commitments); err != nil {
Sietse Ringers's avatar
Sietse Ringers committed
250
				status, output = server.JsonResponse(nil, session.fail(server.ErrorMalformedInput, ""))
251
				return
252
			}
Sietse Ringers's avatar
Sietse Ringers committed
253
			status, output = server.JsonResponse(session.handlePostCommitments(commitments))
Sietse Ringers's avatar
Sietse Ringers committed
254
255
			return
		}
256
		if noun == "proofs" && session.action == irma.ActionDisclosing {
Sietse Ringers's avatar
Sietse Ringers committed
257
258
			disclosure := irma.Disclosure{}
			if err := irma.UnmarshalValidate(message, &disclosure); err != nil {
Sietse Ringers's avatar
Sietse Ringers committed
259
				status, output = server.JsonResponse(nil, session.fail(server.ErrorMalformedInput, ""))
260
				return
261
			}
Sietse Ringers's avatar
Sietse Ringers committed
262
			status, output = server.JsonResponse(session.handlePostDisclosure(disclosure))
Sietse Ringers's avatar
Sietse Ringers committed
263
264
			return
		}
265
		if noun == "proofs" && session.action == irma.ActionSigning {
Sietse Ringers's avatar
Sietse Ringers committed
266
267
			signature := &irma.SignedMessage{}
			if err := irma.UnmarshalValidate(message, signature); err != nil {
Sietse Ringers's avatar
Sietse Ringers committed
268
				status, output = server.JsonResponse(nil, session.fail(server.ErrorMalformedInput, ""))
269
				return
270
			}
Sietse Ringers's avatar
Sietse Ringers committed
271
			status, output = server.JsonResponse(session.handlePostSignature(signature))
272
			return
273
		}
Sietse Ringers's avatar
Sietse Ringers committed
274

Sietse Ringers's avatar
Sietse Ringers committed
275
		status, output = server.JsonResponse(nil, session.fail(server.ErrorInvalidRequest, ""))
276
		return
277
278
	}
}