mod.rs 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391
  1. use std::cmp::Ordering;
  2. use std::collections::HashMap;
  3. use std::path::Path;
  4. use std::str::FromStr;
  5. use std::sync::Arc;
  6. use async_trait::async_trait;
  7. use cdk_common::database::{self, MintAuthDatabase};
  8. use cdk_common::dhke::hash_to_curve;
  9. use cdk_common::mint::MintKeySetInfo;
  10. use cdk_common::nuts::{AuthProof, BlindSignature, Id, PublicKey, State};
  11. use cdk_common::{AuthRequired, ProtectedEndpoint};
  12. use redb::{Database, ReadableTable, TableDefinition};
  13. use crate::error::Error;
  14. const CONFIG_TABLE: TableDefinition<&str, &str> = TableDefinition::new("config");
  15. const ACTIVE_KEYSET_TABLE: TableDefinition<&str, &str> = TableDefinition::new("active_keyset");
  16. const KEYSETS_TABLE: TableDefinition<&str, &str> = TableDefinition::new("keysets");
  17. const PROOFS_TABLE: TableDefinition<[u8; 33], &str> = TableDefinition::new("proofs");
  18. const PROOFS_STATE_TABLE: TableDefinition<[u8; 33], &str> = TableDefinition::new("proofs_state");
  19. // Key is hex blinded_message B_ value is blinded_signature
  20. const BLINDED_SIGNATURES: TableDefinition<[u8; 33], &str> =
  21. TableDefinition::new("blinded_signatures");
  22. const ENDPOINTS_TABLE: TableDefinition<&str, &str> = TableDefinition::new("endpoints");
  23. /// Mint Redbdatabase
  24. #[derive(Debug, Clone)]
  25. pub struct MintRedbAuthDatabase {
  26. db: Arc<Database>,
  27. }
  28. const DATABASE_VERSION: u32 = 0;
  29. impl MintRedbAuthDatabase {
  30. /// Create new [`MintRedbAuthDatabase`]
  31. pub fn new(path: &Path) -> Result<Self, Error> {
  32. {
  33. // Check database version
  34. let db = Arc::new(Database::create(path)?);
  35. // Check database version
  36. let read_txn = db.begin_read()?;
  37. let table = read_txn.open_table(CONFIG_TABLE);
  38. let db_version = match table {
  39. Ok(table) => table.get("db_version")?.map(|v| v.value().to_owned()),
  40. Err(_) => None,
  41. };
  42. match db_version {
  43. Some(db_version) => {
  44. let current_file_version = u32::from_str(&db_version)?;
  45. match current_file_version.cmp(&DATABASE_VERSION) {
  46. Ordering::Less => {
  47. tracing::info!(
  48. "Database needs to be upgraded at {} current is {}",
  49. current_file_version,
  50. DATABASE_VERSION
  51. );
  52. }
  53. Ordering::Equal => {
  54. tracing::info!("Database is at current version {}", DATABASE_VERSION);
  55. }
  56. Ordering::Greater => {
  57. tracing::warn!(
  58. "Database upgrade did not complete at {} current is {}",
  59. current_file_version,
  60. DATABASE_VERSION
  61. );
  62. return Err(Error::UnknownDatabaseVersion);
  63. }
  64. }
  65. }
  66. None => {
  67. let write_txn = db.begin_write()?;
  68. {
  69. let mut table = write_txn.open_table(CONFIG_TABLE)?;
  70. // Open all tables to init a new db
  71. let _ = write_txn.open_table(ACTIVE_KEYSET_TABLE)?;
  72. let _ = write_txn.open_table(KEYSETS_TABLE)?;
  73. let _ = write_txn.open_table(PROOFS_TABLE)?;
  74. let _ = write_txn.open_table(PROOFS_STATE_TABLE)?;
  75. let _ = write_txn.open_table(BLINDED_SIGNATURES)?;
  76. table.insert("db_version", DATABASE_VERSION.to_string().as_str())?;
  77. }
  78. write_txn.commit()?;
  79. }
  80. }
  81. drop(db);
  82. }
  83. let db = Database::create(path)?;
  84. Ok(Self { db: Arc::new(db) })
  85. }
  86. }
  87. #[async_trait]
  88. impl MintAuthDatabase for MintRedbAuthDatabase {
  89. type Err = database::Error;
  90. async fn set_active_keyset(&self, id: Id) -> Result<(), Self::Err> {
  91. let write_txn = self.db.begin_write().map_err(Error::from)?;
  92. {
  93. let mut table = write_txn
  94. .open_table(ACTIVE_KEYSET_TABLE)
  95. .map_err(Error::from)?;
  96. table
  97. .insert("active_keyset_id", id.to_string().as_str())
  98. .map_err(Error::from)?;
  99. }
  100. write_txn.commit().map_err(Error::from)?;
  101. Ok(())
  102. }
  103. async fn get_active_keyset_id(&self) -> Result<Option<Id>, Self::Err> {
  104. let read_txn = self.db.begin_read().map_err(Error::from)?;
  105. let table = read_txn
  106. .open_table(ACTIVE_KEYSET_TABLE)
  107. .map_err(Error::from)?;
  108. if let Some(id) = table.get("active_keyset_id").map_err(Error::from)? {
  109. return Ok(Some(Id::from_str(id.value()).map_err(Error::from)?));
  110. }
  111. Ok(None)
  112. }
  113. async fn add_keyset_info(&self, keyset: MintKeySetInfo) -> Result<(), Self::Err> {
  114. let write_txn = self.db.begin_write().map_err(Error::from)?;
  115. {
  116. let mut table = write_txn.open_table(KEYSETS_TABLE).map_err(Error::from)?;
  117. table
  118. .insert(
  119. keyset.id.to_string().as_str(),
  120. serde_json::to_string(&keyset)
  121. .map_err(Error::from)?
  122. .as_str(),
  123. )
  124. .map_err(Error::from)?;
  125. }
  126. write_txn.commit().map_err(Error::from)?;
  127. Ok(())
  128. }
  129. async fn get_keyset_info(&self, keyset_id: &Id) -> Result<Option<MintKeySetInfo>, Self::Err> {
  130. let read_txn = self.db.begin_read().map_err(Error::from)?;
  131. let table = read_txn.open_table(KEYSETS_TABLE).map_err(Error::from)?;
  132. match table
  133. .get(keyset_id.to_string().as_str())
  134. .map_err(Error::from)?
  135. {
  136. Some(keyset) => Ok(serde_json::from_str(keyset.value()).map_err(Error::from)?),
  137. None => Ok(None),
  138. }
  139. }
  140. async fn get_keyset_infos(&self) -> Result<Vec<MintKeySetInfo>, Self::Err> {
  141. let read_txn = self.db.begin_read().map_err(Error::from)?;
  142. let table = read_txn.open_table(KEYSETS_TABLE).map_err(Error::from)?;
  143. let mut keysets = Vec::new();
  144. for (_id, keyset) in (table.iter().map_err(Error::from)?).flatten() {
  145. let keyset = serde_json::from_str(keyset.value()).map_err(Error::from)?;
  146. keysets.push(keyset)
  147. }
  148. Ok(keysets)
  149. }
  150. async fn add_proof(&self, proof: AuthProof) -> Result<(), Self::Err> {
  151. let write_txn = self.db.begin_write().map_err(Error::from)?;
  152. {
  153. let mut table = write_txn.open_table(PROOFS_TABLE).map_err(Error::from)?;
  154. let y: PublicKey = hash_to_curve(&proof.secret.to_bytes()).map_err(Error::from)?;
  155. let y = y.to_bytes();
  156. if table.get(y).map_err(Error::from)?.is_none() {
  157. table
  158. .insert(
  159. y,
  160. serde_json::to_string(&proof).map_err(Error::from)?.as_str(),
  161. )
  162. .map_err(Error::from)?;
  163. }
  164. }
  165. write_txn.commit().map_err(Error::from)?;
  166. Ok(())
  167. }
  168. async fn update_proof_state(
  169. &self,
  170. y: &PublicKey,
  171. proof_state: State,
  172. ) -> Result<Option<State>, Self::Err> {
  173. let write_txn = self.db.begin_write().map_err(Error::from)?;
  174. let state_str = serde_json::to_string(&proof_state).map_err(Error::from)?;
  175. let current_state;
  176. {
  177. let mut table = write_txn
  178. .open_table(PROOFS_STATE_TABLE)
  179. .map_err(Error::from)?;
  180. {
  181. match table.get(y.to_bytes()).map_err(Error::from)? {
  182. Some(state) => {
  183. current_state =
  184. Some(serde_json::from_str(state.value()).map_err(Error::from)?)
  185. }
  186. None => current_state = None,
  187. }
  188. }
  189. if current_state != Some(State::Spent) {
  190. table
  191. .insert(y.to_bytes(), state_str.as_str())
  192. .map_err(Error::from)?;
  193. }
  194. }
  195. write_txn.commit().map_err(Error::from)?;
  196. Ok(current_state)
  197. }
  198. async fn get_proofs_states(&self, ys: &[PublicKey]) -> Result<Vec<Option<State>>, Self::Err> {
  199. let read_txn = self.db.begin_read().map_err(Error::from)?;
  200. let table = read_txn
  201. .open_table(PROOFS_STATE_TABLE)
  202. .map_err(Error::from)?;
  203. let mut states = Vec::with_capacity(ys.len());
  204. for y in ys {
  205. match table.get(y.to_bytes()).map_err(Error::from)? {
  206. Some(state) => states.push(Some(
  207. serde_json::from_str(state.value()).map_err(Error::from)?,
  208. )),
  209. None => states.push(None),
  210. }
  211. }
  212. Ok(states)
  213. }
  214. async fn add_blind_signatures(
  215. &self,
  216. blinded_messages: &[PublicKey],
  217. blind_signatures: &[BlindSignature],
  218. ) -> Result<(), Self::Err> {
  219. let write_txn = self.db.begin_write().map_err(Error::from)?;
  220. {
  221. let mut table = write_txn
  222. .open_table(BLINDED_SIGNATURES)
  223. .map_err(Error::from)?;
  224. for (blinded_message, blind_signature) in blinded_messages.iter().zip(blind_signatures)
  225. {
  226. let blind_sig = serde_json::to_string(&blind_signature).map_err(Error::from)?;
  227. table
  228. .insert(blinded_message.to_bytes(), blind_sig.as_str())
  229. .map_err(Error::from)?;
  230. }
  231. }
  232. write_txn.commit().map_err(Error::from)?;
  233. Ok(())
  234. }
  235. async fn get_blind_signatures(
  236. &self,
  237. blinded_messages: &[PublicKey],
  238. ) -> Result<Vec<Option<BlindSignature>>, Self::Err> {
  239. let read_txn = self.db.begin_read().map_err(Error::from)?;
  240. let table = read_txn
  241. .open_table(BLINDED_SIGNATURES)
  242. .map_err(Error::from)?;
  243. let mut signatures = Vec::with_capacity(blinded_messages.len());
  244. for blinded_message in blinded_messages {
  245. match table.get(blinded_message.to_bytes()).map_err(Error::from)? {
  246. Some(blind_signature) => signatures.push(Some(
  247. serde_json::from_str(blind_signature.value()).map_err(Error::from)?,
  248. )),
  249. None => signatures.push(None),
  250. }
  251. }
  252. Ok(signatures)
  253. }
  254. async fn add_protected_endpoints(
  255. &self,
  256. protected_endpoints: HashMap<ProtectedEndpoint, AuthRequired>,
  257. ) -> Result<(), Self::Err> {
  258. let write_txn = self.db.begin_write().map_err(Error::from)?;
  259. {
  260. let mut table = write_txn.open_table(ENDPOINTS_TABLE).map_err(Error::from)?;
  261. for (endpoint, auth) in protected_endpoints.iter() {
  262. table
  263. .insert(
  264. serde_json::to_string(endpoint)
  265. .map_err(Error::from)?
  266. .as_str(),
  267. serde_json::to_string(&auth).map_err(Error::from)?.as_str(),
  268. )
  269. .map_err(Error::from)?;
  270. }
  271. }
  272. write_txn.commit().map_err(Error::from)?;
  273. Ok(())
  274. }
  275. async fn remove_protected_endpoints(
  276. &self,
  277. protected_endpoints: Vec<ProtectedEndpoint>,
  278. ) -> Result<(), Self::Err> {
  279. let write_txn = self.db.begin_write().map_err(Error::from)?;
  280. {
  281. let mut table = write_txn.open_table(ENDPOINTS_TABLE).map_err(Error::from)?;
  282. for endpoint in protected_endpoints.iter() {
  283. table
  284. .remove(
  285. serde_json::to_string(endpoint)
  286. .map_err(Error::from)?
  287. .as_str(),
  288. )
  289. .map_err(Error::from)?;
  290. }
  291. }
  292. write_txn.commit().map_err(Error::from)?;
  293. Ok(())
  294. }
  295. async fn get_auth_for_endpoint(
  296. &self,
  297. protected_endpoint: ProtectedEndpoint,
  298. ) -> Result<Option<AuthRequired>, Self::Err> {
  299. let read_txn = self.db.begin_read().map_err(Error::from)?;
  300. let table = read_txn.open_table(ENDPOINTS_TABLE).map_err(Error::from)?;
  301. match table
  302. .get(
  303. serde_json::to_string(&protected_endpoint)
  304. .map_err(Error::from)?
  305. .as_str(),
  306. )
  307. .map_err(Error::from)?
  308. {
  309. Some(auth) => Ok(serde_json::from_str(auth.value()).map_err(Error::from)?),
  310. None => Ok(None),
  311. }
  312. }
  313. async fn get_auth_for_endpoints(
  314. &self,
  315. ) -> Result<HashMap<ProtectedEndpoint, Option<AuthRequired>>, Self::Err> {
  316. let read_txn = self.db.begin_read().map_err(Error::from)?;
  317. let table = read_txn.open_table(ENDPOINTS_TABLE).map_err(Error::from)?;
  318. let mut protected = HashMap::new();
  319. for (endpoint, auth) in (table.iter().map_err(Error::from)?).flatten() {
  320. let endpoint: ProtectedEndpoint =
  321. serde_json::from_str(endpoint.value()).map_err(Error::from)?;
  322. let auth: AuthRequired = serde_json::from_str(auth.value()).map_err(Error::from)?;
  323. protected.insert(endpoint, Some(auth));
  324. }
  325. Ok(protected)
  326. }
  327. }