| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428 |
- //! SQL Mint Auth
- use std::collections::HashMap;
- use std::fmt::Debug;
- use std::str::FromStr;
- use std::sync::Arc;
- use async_trait::async_trait;
- use cdk_common::database::{self, MintAuthDatabase, MintAuthTransaction};
- use cdk_common::mint::MintKeySetInfo;
- use cdk_common::nuts::{AuthProof, BlindSignature, Id, PublicKey, State};
- use cdk_common::{AuthRequired, ProtectedEndpoint};
- use migrations::MIGRATIONS;
- use tracing::instrument;
- use super::{sql_row_to_blind_signature, sql_row_to_keyset_info, SQLTransaction};
- use crate::column_as_string;
- use crate::common::migrate;
- use crate::database::{ConnectionWithTransaction, DatabaseExecutor};
- use crate::mint::Error;
- use crate::pool::{DatabasePool, Pool, PooledResource};
- use crate::stmt::query;
- /// Mint SQL Database
- #[derive(Debug, Clone)]
- pub struct SQLMintAuthDatabase<RM>
- where
- RM: DatabasePool + 'static,
- {
- pool: Arc<Pool<RM>>,
- }
- impl<RM> SQLMintAuthDatabase<RM>
- where
- RM: DatabasePool + 'static,
- {
- /// Creates a new instance
- pub async fn new<X>(db: X) -> Result<Self, Error>
- where
- X: Into<RM::Config>,
- {
- let pool = Pool::new(db.into());
- Self::migrate(pool.get().map_err(|e| Error::Database(Box::new(e)))?).await?;
- Ok(Self { pool })
- }
- /// Migrate
- async fn migrate(conn: PooledResource<RM>) -> Result<(), Error> {
- let tx = ConnectionWithTransaction::new(conn).await?;
- migrate(&tx, RM::Connection::name(), MIGRATIONS).await?;
- tx.commit().await?;
- Ok(())
- }
- }
- #[rustfmt::skip]
- mod migrations;
- #[async_trait]
- impl<RM> MintAuthTransaction<database::Error> for SQLTransaction<RM>
- where
- RM: DatabasePool + 'static,
- {
- #[instrument(skip(self))]
- async fn set_active_keyset(&mut self, id: Id) -> Result<(), database::Error> {
- tracing::info!("Setting auth keyset {id} active");
- query(
- r#"
- UPDATE keyset
- SET active = CASE
- WHEN id = :id THEN TRUE
- ELSE FALSE
- END;
- "#,
- )?
- .bind("id", id.to_string())
- .execute(&self.inner)
- .await?;
- Ok(())
- }
- async fn add_keyset_info(&mut self, keyset: MintKeySetInfo) -> Result<(), database::Error> {
- query(
- r#"
- INSERT INTO
- keyset (
- id, unit, active, valid_from, valid_to, derivation_path,
- max_order, derivation_path_index
- )
- VALUES (
- :id, :unit, :active, :valid_from, :valid_to, :derivation_path,
- :max_order, :derivation_path_index
- )
- ON CONFLICT(id) DO UPDATE SET
- unit = excluded.unit,
- active = excluded.active,
- valid_from = excluded.valid_from,
- valid_to = excluded.valid_to,
- derivation_path = excluded.derivation_path,
- max_order = excluded.max_order,
- derivation_path_index = excluded.derivation_path_index
- "#,
- )?
- .bind("id", keyset.id.to_string())
- .bind("unit", keyset.unit.to_string())
- .bind("active", keyset.active)
- .bind("valid_from", keyset.valid_from as i64)
- .bind("valid_to", keyset.final_expiry.map(|v| v as i64))
- .bind("derivation_path", keyset.derivation_path.to_string())
- .bind("max_order", keyset.max_order)
- .bind("derivation_path_index", keyset.derivation_path_index)
- .execute(&self.inner)
- .await?;
- Ok(())
- }
- async fn add_proof(&mut self, proof: AuthProof) -> Result<(), database::Error> {
- if let Err(err) = query(
- r#"
- INSERT INTO proof
- (y, keyset_id, secret, c, state)
- VALUES
- (:y, :keyset_id, :secret, :c, :state)
- "#,
- )?
- .bind("y", proof.y()?.to_bytes().to_vec())
- .bind("keyset_id", proof.keyset_id.to_string())
- .bind("secret", proof.secret.to_string())
- .bind("c", proof.c.to_bytes().to_vec())
- .bind("state", "UNSPENT".to_string())
- .execute(&self.inner)
- .await
- {
- tracing::debug!("Attempting to add known proof. Skipping.... {:?}", err);
- }
- Ok(())
- }
- async fn update_proof_state(
- &mut self,
- y: &PublicKey,
- proofs_state: State,
- ) -> Result<Option<State>, Self::Err> {
- let current_state = query(r#"SELECT state FROM proof WHERE y = :y FOR UPDATE"#)?
- .bind("y", y.to_bytes().to_vec())
- .pluck(&self.inner)
- .await?
- .map(|state| Ok::<_, Error>(column_as_string!(state, State::from_str)))
- .transpose()?;
- query(r#"UPDATE proof SET state = :new_state WHERE state = :state AND y = :y"#)?
- .bind("y", y.to_bytes().to_vec())
- .bind(
- "state",
- current_state.as_ref().map(|state| state.to_string()),
- )
- .bind("new_state", proofs_state.to_string())
- .execute(&self.inner)
- .await?;
- Ok(current_state)
- }
- async fn add_blind_signatures(
- &mut self,
- blinded_messages: &[PublicKey],
- blind_signatures: &[BlindSignature],
- ) -> Result<(), database::Error> {
- for (message, signature) in blinded_messages.iter().zip(blind_signatures) {
- query(
- r#"
- INSERT
- INTO blind_signature
- (blinded_message, amount, keyset_id, c)
- VALUES
- (:blinded_message, :amount, :keyset_id, :c)
- "#,
- )?
- .bind("blinded_message", message.to_bytes().to_vec())
- .bind("amount", u64::from(signature.amount) as i64)
- .bind("keyset_id", signature.keyset_id.to_string())
- .bind("c", signature.c.to_bytes().to_vec())
- .execute(&self.inner)
- .await?;
- }
- Ok(())
- }
- async fn add_protected_endpoints(
- &mut self,
- protected_endpoints: HashMap<ProtectedEndpoint, AuthRequired>,
- ) -> Result<(), database::Error> {
- for (endpoint, auth) in protected_endpoints.iter() {
- if let Err(err) = query(
- r#"
- INSERT OR REPLACE INTO protected_endpoints
- (endpoint, auth)
- VALUES (:endpoint, :auth);
- "#,
- )?
- .bind("endpoint", serde_json::to_string(endpoint)?)
- .bind("auth", serde_json::to_string(auth)?)
- .execute(&self.inner)
- .await
- {
- tracing::debug!(
- "Attempting to add protected endpoint. Skipping.... {:?}",
- err
- );
- }
- }
- Ok(())
- }
- async fn remove_protected_endpoints(
- &mut self,
- protected_endpoints: Vec<ProtectedEndpoint>,
- ) -> Result<(), database::Error> {
- query(r#"DELETE FROM protected_endpoints WHERE endpoint IN (:endpoints)"#)?
- .bind_vec(
- "endpoints",
- protected_endpoints
- .iter()
- .map(serde_json::to_string)
- .collect::<Result<_, _>>()?,
- )
- .execute(&self.inner)
- .await?;
- Ok(())
- }
- }
- #[async_trait]
- impl<RM> MintAuthDatabase for SQLMintAuthDatabase<RM>
- where
- RM: DatabasePool + 'static,
- {
- type Err = database::Error;
- async fn begin_transaction<'a>(
- &'a self,
- ) -> Result<Box<dyn MintAuthTransaction<database::Error> + Send + Sync + 'a>, database::Error>
- {
- Ok(Box::new(SQLTransaction {
- inner: ConnectionWithTransaction::new(
- self.pool.get().map_err(|e| Error::Database(Box::new(e)))?,
- )
- .await?,
- }))
- }
- async fn get_active_keyset_id(&self) -> Result<Option<Id>, Self::Err> {
- let conn = self.pool.get().map_err(|e| Error::Database(Box::new(e)))?;
- Ok(query(
- r#"
- SELECT
- id
- FROM
- keyset
- WHERE
- active = :active;
- "#,
- )?
- .bind("active", true)
- .pluck(&*conn)
- .await?
- .map(|id| Ok::<_, Error>(column_as_string!(id, Id::from_str, Id::from_bytes)))
- .transpose()?)
- }
- async fn get_keyset_info(&self, id: &Id) -> Result<Option<MintKeySetInfo>, Self::Err> {
- let conn = self.pool.get().map_err(|e| Error::Database(Box::new(e)))?;
- Ok(query(
- r#"SELECT
- id,
- unit,
- active,
- valid_from,
- valid_to,
- derivation_path,
- derivation_path_index,
- max_order,
- amounts,
- input_fee_ppk
- FROM
- keyset
- WHERE id=:id"#,
- )?
- .bind("id", id.to_string())
- .fetch_one(&*conn)
- .await?
- .map(sql_row_to_keyset_info)
- .transpose()?)
- }
- async fn get_keyset_infos(&self) -> Result<Vec<MintKeySetInfo>, Self::Err> {
- let conn = self.pool.get().map_err(|e| Error::Database(Box::new(e)))?;
- Ok(query(
- r#"SELECT
- id,
- unit,
- active,
- valid_from,
- valid_to,
- derivation_path,
- derivation_path_index,
- max_order,
- amounts,
- input_fee_ppk
- FROM
- keyset
- WHERE id=:id"#,
- )?
- .fetch_all(&*conn)
- .await?
- .into_iter()
- .map(sql_row_to_keyset_info)
- .collect::<Result<Vec<_>, _>>()?)
- }
- async fn get_proofs_states(&self, ys: &[PublicKey]) -> Result<Vec<Option<State>>, Self::Err> {
- if ys.is_empty() {
- return Ok(vec![]);
- }
- let conn = self.pool.get().map_err(|e| Error::Database(Box::new(e)))?;
- let mut current_states = query(r#"SELECT y, state FROM proof WHERE y IN (:ys)"#)?
- .bind_vec("ys", ys.iter().map(|y| y.to_bytes().to_vec()).collect())
- .fetch_all(&*conn)
- .await?
- .into_iter()
- .map(|row| {
- Ok((
- column_as_string!(&row[0], PublicKey::from_hex, PublicKey::from_slice),
- column_as_string!(&row[1], State::from_str),
- ))
- })
- .collect::<Result<HashMap<_, _>, Error>>()?;
- Ok(ys.iter().map(|y| current_states.remove(y)).collect())
- }
- async fn get_blind_signatures(
- &self,
- blinded_messages: &[PublicKey],
- ) -> Result<Vec<Option<BlindSignature>>, Self::Err> {
- let conn = self.pool.get().map_err(|e| Error::Database(Box::new(e)))?;
- let mut blinded_signatures = query(
- r#"SELECT
- keyset_id,
- amount,
- c,
- dleq_e,
- dleq_s,
- blinded_message,
- FROM
- blind_signature
- WHERE blinded_message IN (:blinded_message)
- "#,
- )?
- .bind_vec(
- "blinded_message",
- blinded_messages
- .iter()
- .map(|bm| bm.to_bytes().to_vec())
- .collect(),
- )
- .fetch_all(&*conn)
- .await?
- .into_iter()
- .map(|mut row| {
- Ok((
- column_as_string!(
- &row.pop().ok_or(Error::InvalidDbResponse)?,
- PublicKey::from_hex,
- PublicKey::from_slice
- ),
- sql_row_to_blind_signature(row)?,
- ))
- })
- .collect::<Result<HashMap<_, _>, Error>>()?;
- Ok(blinded_messages
- .iter()
- .map(|bm| blinded_signatures.remove(bm))
- .collect())
- }
- async fn get_auth_for_endpoint(
- &self,
- protected_endpoint: ProtectedEndpoint,
- ) -> Result<Option<AuthRequired>, Self::Err> {
- let conn = self.pool.get().map_err(|e| Error::Database(Box::new(e)))?;
- Ok(
- query(r#"SELECT auth FROM protected_endpoints WHERE endpoint = :endpoint"#)?
- .bind("endpoint", serde_json::to_string(&protected_endpoint)?)
- .pluck(&*conn)
- .await?
- .map(|auth| {
- Ok::<_, Error>(column_as_string!(
- auth,
- serde_json::from_str,
- serde_json::from_slice
- ))
- })
- .transpose()?,
- )
- }
- async fn get_auth_for_endpoints(
- &self,
- ) -> Result<HashMap<ProtectedEndpoint, Option<AuthRequired>>, Self::Err> {
- let conn = self.pool.get().map_err(|e| Error::Database(Box::new(e)))?;
- Ok(query(r#"SELECT endpoint, auth FROM protected_endpoints"#)?
- .fetch_all(&*conn)
- .await?
- .into_iter()
- .map(|row| {
- let endpoint =
- column_as_string!(&row[0], serde_json::from_str, serde_json::from_slice);
- let auth = column_as_string!(&row[1], serde_json::from_str, serde_json::from_slice);
- Ok((endpoint, Some(auth)))
- })
- .collect::<Result<HashMap<_, _>, Error>>()?)
- }
- }
|