mirror of
https://github.com/onsonr/sonr.git
synced 2025-03-10 21:09:11 +00:00
* feat: enable DID auth middleware * feat: implement passkey creation flow * feat: persist user address in cookie and retrieve user profile using address cookie * feat: implement human verification challenge during session initialization * refactor: remove unnecessary random number generation in profile creation * refactor: rename credential validation handler and update related routes * feat: improve profile validation and user experience * feat: add page rendering for profile and passkey creation * refactor: remove unused register handler and update routes * refactor: remove unused imports and simplify credential validation * fix: Correct insecure gRPC client connection * refactor: rename models files for better organization * refactor: refactor grpc client creation and management * refactor: refactor common clients package * <no value> * feat: add CapAccount, CapInterchain, CapVault enums * feat: add ChainId to ResAccount and ResInterchain * feat: add asset code to resource account enumeration * refactor: rename services package to providers * feat: implement gateway database interactions * refactor: move gateway repository to internal/gateway * refactor: Migrate database provider to use sqlx * refactor: Rename Vaults to VaultProvider in HTTPContext struct * refactor: Migrate from GORM to sqlc Queries in database context methods * refactor: Replace GORM with standard SQL and simplify database initialization * refactor: Migrate session management from GORM to sqlc with type conversion * refactor: Update import paths and model references in context package * fix: Resolve session type conversion and middleware issues * refactor: Migrate database from GORM to sqlx * refactor: Move models to pkg/common, improve code structure * refactor: move repository package to internal directory * refactor: move gateway internal packages to context directory * refactor: migrate database provider to use sqlx queries * feat: add session ID to HTTP context and use it to load session data * feat: implement vault creation API endpoint * feat: add DIDKey generation from PubKey * refactor: remove unused DIDAuth components * refactor: move DID auth controller to vault context * chore: remove unused DIDAuth package * refactor: improve clarity of enclave refresh function * feat: implement nonce-based key encryption for improved security * feat: Add Export and Import methods with comprehensive tests for Enclave * fix: Validate AES key length in keyshare encryption and decryption * fix: Resolve key length validation by hashing input keys * refactor: Update keyshare import to use protocol decoding * feat: Refactor enclave encryption to support full enclave export/import * refactor: Simplify Enclave interface methods by removing role parameter * refactor: remove unnecessary serialization from enclave interface * refactor: rename models package in gateway context * refactor: rename keystore vault constants * refactor: remove context parameter from Resolver methods * feat: add CurrentBlock context function and update related components * refactor: rename resolver.go to resolvers.go * feat: Add SQLite random() generation for session and profile initialization * refactor: Update SQL queries to use SQLite-style parameter placeholders * refactor: Replace '?' placeholders with '$n' PostgreSQL parameter syntax * <no value> * refactor: refactor gateway to use middleware for database interactions and improve modularity * feat: implement gateway for Sonr highway * refactor: Remove unused gateway context and refactor cookie/header handling * refactor: improve server initialization and middleware handling * feat: implement human verification for profile creation * feat: implement session management middleware * refactor: refactor common models and config to internal package * refactor: move env config to internal/config * refactor: move database-related code to directory * refactor: move IPFS client to common package and improve code structure * refactor: move querier to common package and rename to chain_query * refactor: move webworker model to internal/models * feat: add initial view template for Sonr.ID * docs(concepts): Add documentation for cosmos-proto * docs: move IBC transfer documentation to tools section * refactor: rename initpkl.go to pkl_init.go for better naming consistency * docs(theme): update dark mode toggle icons * refactor: update sqlite3 driver to ncruces/go-sqlite3 * feat: add Vault model and database interactions * refactor: Improve SQLite schema with better constraints and indexes * chore: update project dependencies * fix: use grpc.WithInsecure() for gRPC connection * config: set localhost as default Sonr gRPC URL * refactor: improve gateway middleware and refactor server initialization * refactor: Remove foreign key pragma from schema SQL * refactor: Remove foreign key constraints from database schema * refactor: Convert primary key columns from INTEGER to TEXT * refactor: Remove unnecessary redirect in error handling
143 lines
3.1 KiB
Go
143 lines
3.1 KiB
Go
package common
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"sort"
|
|
"sync"
|
|
|
|
"github.com/golang-jwt/jwt"
|
|
"github.com/ipfs/go-cid"
|
|
"github.com/onsonr/sonr/crypto/keys"
|
|
"github.com/onsonr/sonr/crypto/ucan"
|
|
)
|
|
|
|
type IPFSTokenStore interface {
|
|
ucan.TokenStore
|
|
ResolveCIDBytes(ctx context.Context, id cid.Cid) ([]byte, error)
|
|
ResolveDIDKey(ctx context.Context, did string) (keys.DID, error)
|
|
}
|
|
|
|
// ipfsUCANStore is a token store that uses IPFS to store tokens. It uses the memory store as a cache
|
|
// for CID strings to be used as keys for retrieving tokens.
|
|
type ipfsUCANStore struct {
|
|
sync.Mutex
|
|
ipfs IPFS
|
|
cache map[string]string
|
|
}
|
|
|
|
// NewUCANStore creates a new IPFS-backed token store
|
|
func NewUCANStore(ipfsClient IPFS) IPFSTokenStore {
|
|
return &ipfsUCANStore{
|
|
ipfs: ipfsClient,
|
|
cache: make(map[string]string),
|
|
}
|
|
}
|
|
|
|
func (st *ipfsUCANStore) PutToken(ctx context.Context, key string, raw string) error {
|
|
// Validate token format
|
|
p := &jwt.Parser{
|
|
UseJSONNumber: true,
|
|
SkipClaimsValidation: false,
|
|
}
|
|
if _, _, err := p.ParseUnverified(raw, jwt.MapClaims{}); err != nil {
|
|
return fmt.Errorf("%w: %s", ucan.ErrInvalidToken, err)
|
|
}
|
|
|
|
// Store token in IPFS
|
|
cid, err := st.ipfs.Add([]byte(raw))
|
|
if err != nil {
|
|
return fmt.Errorf("failed to store token in IPFS: %w", err)
|
|
}
|
|
|
|
// Update cache
|
|
st.Lock()
|
|
defer st.Unlock()
|
|
st.cache[key] = cid
|
|
return nil
|
|
}
|
|
|
|
func (st *ipfsUCANStore) RawToken(ctx context.Context, key string) (string, error) {
|
|
st.Lock()
|
|
cid, exists := st.cache[key]
|
|
st.Unlock()
|
|
|
|
if !exists {
|
|
return "", ucan.ErrTokenNotFound
|
|
}
|
|
|
|
// Retrieve token from IPFS
|
|
data, err := st.ipfs.Get(cid)
|
|
if err != nil {
|
|
return "", fmt.Errorf("failed to retrieve token from IPFS: %w", err)
|
|
}
|
|
|
|
return string(data), nil
|
|
}
|
|
|
|
func (st *ipfsUCANStore) DeleteToken(ctx context.Context, key string) error {
|
|
st.Lock()
|
|
defer st.Unlock()
|
|
|
|
cid, exists := st.cache[key]
|
|
if !exists {
|
|
return ucan.ErrTokenNotFound
|
|
}
|
|
|
|
// Unpin from IPFS
|
|
if err := st.ipfs.Unpin(cid); err != nil {
|
|
return fmt.Errorf("failed to unpin token from IPFS: %w", err)
|
|
}
|
|
|
|
delete(st.cache, key)
|
|
return nil
|
|
}
|
|
|
|
func (st *ipfsUCANStore) ListTokens(ctx context.Context, offset, limit int) ([]ucan.RawToken, error) {
|
|
st.Lock()
|
|
defer st.Unlock()
|
|
|
|
tokens := make(ucan.RawTokens, 0, len(st.cache))
|
|
for key, cid := range st.cache {
|
|
data, err := st.ipfs.Get(cid)
|
|
if err != nil {
|
|
continue // Skip invalid tokens
|
|
}
|
|
tokens = append(tokens, ucan.RawToken{
|
|
Key: key,
|
|
Raw: string(data),
|
|
})
|
|
}
|
|
|
|
// Sort tokens
|
|
sort.Sort(tokens)
|
|
|
|
// Apply pagination
|
|
if offset >= len(tokens) {
|
|
return []ucan.RawToken{}, nil
|
|
}
|
|
|
|
end := offset + limit
|
|
if end > len(tokens) || limit <= 0 {
|
|
end = len(tokens)
|
|
}
|
|
|
|
return tokens[offset:end], nil
|
|
}
|
|
|
|
func (st *ipfsUCANStore) ResolveCIDBytes(ctx context.Context, id cid.Cid) ([]byte, error) {
|
|
data, err := st.ipfs.Get(id.String())
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to resolve CID bytes: %w", err)
|
|
}
|
|
return data, nil
|
|
}
|
|
|
|
func (st *ipfsUCANStore) ResolveDIDKey(ctx context.Context, did string) (keys.DID, error) {
|
|
id, err := keys.Parse(did)
|
|
if err != nil {
|
|
return keys.DID{}, fmt.Errorf("failed to parse DID: %w", err)
|
|
}
|
|
return id, nil
|
|
}
|