mirror of
https://github.com/onsonr/sonr.git
synced 2025-03-10 21:09:11 +00:00
* feat: enable DID auth middleware * feat: implement passkey creation flow * feat: persist user address in cookie and retrieve user profile using address cookie * feat: implement human verification challenge during session initialization * refactor: remove unnecessary random number generation in profile creation * refactor: rename credential validation handler and update related routes * feat: improve profile validation and user experience * feat: add page rendering for profile and passkey creation * refactor: remove unused register handler and update routes * refactor: remove unused imports and simplify credential validation * fix: Correct insecure gRPC client connection * refactor: rename models files for better organization * refactor: refactor grpc client creation and management * refactor: refactor common clients package * <no value> * feat: add CapAccount, CapInterchain, CapVault enums * feat: add ChainId to ResAccount and ResInterchain * feat: add asset code to resource account enumeration * refactor: rename services package to providers * feat: implement gateway database interactions * refactor: move gateway repository to internal/gateway * refactor: Migrate database provider to use sqlx * refactor: Rename Vaults to VaultProvider in HTTPContext struct * refactor: Migrate from GORM to sqlc Queries in database context methods * refactor: Replace GORM with standard SQL and simplify database initialization * refactor: Migrate session management from GORM to sqlc with type conversion * refactor: Update import paths and model references in context package * fix: Resolve session type conversion and middleware issues * refactor: Migrate database from GORM to sqlx * refactor: Move models to pkg/common, improve code structure * refactor: move repository package to internal directory * refactor: move gateway internal packages to context directory * refactor: migrate database provider to use sqlx queries * feat: add session ID to HTTP context and use it to load session data * feat: implement vault creation API endpoint * feat: add DIDKey generation from PubKey * refactor: remove unused DIDAuth components * refactor: move DID auth controller to vault context * chore: remove unused DIDAuth package * refactor: improve clarity of enclave refresh function * feat: implement nonce-based key encryption for improved security * feat: Add Export and Import methods with comprehensive tests for Enclave * fix: Validate AES key length in keyshare encryption and decryption * fix: Resolve key length validation by hashing input keys * refactor: Update keyshare import to use protocol decoding * feat: Refactor enclave encryption to support full enclave export/import * refactor: Simplify Enclave interface methods by removing role parameter * refactor: remove unnecessary serialization from enclave interface * refactor: rename models package in gateway context * refactor: rename keystore vault constants * refactor: remove context parameter from Resolver methods * feat: add CurrentBlock context function and update related components * refactor: rename resolver.go to resolvers.go * feat: Add SQLite random() generation for session and profile initialization * refactor: Update SQL queries to use SQLite-style parameter placeholders * refactor: Replace '?' placeholders with '$n' PostgreSQL parameter syntax * <no value> * refactor: refactor gateway to use middleware for database interactions and improve modularity * feat: implement gateway for Sonr highway * refactor: Remove unused gateway context and refactor cookie/header handling * refactor: improve server initialization and middleware handling * feat: implement human verification for profile creation * feat: implement session management middleware * refactor: refactor common models and config to internal package * refactor: move env config to internal/config * refactor: move database-related code to directory * refactor: move IPFS client to common package and improve code structure * refactor: move querier to common package and rename to chain_query * refactor: move webworker model to internal/models * feat: add initial view template for Sonr.ID * docs(concepts): Add documentation for cosmos-proto * docs: move IBC transfer documentation to tools section * refactor: rename initpkl.go to pkl_init.go for better naming consistency * docs(theme): update dark mode toggle icons * refactor: update sqlite3 driver to ncruces/go-sqlite3 * feat: add Vault model and database interactions * refactor: Improve SQLite schema with better constraints and indexes * chore: update project dependencies * fix: use grpc.WithInsecure() for gRPC connection * config: set localhost as default Sonr gRPC URL * refactor: improve gateway middleware and refactor server initialization * refactor: Remove foreign key pragma from schema SQL * refactor: Remove foreign key constraints from database schema * refactor: Convert primary key columns from INTEGER to TEXT * refactor: Remove unnecessary redirect in error handling
180 lines
4.0 KiB
Go
180 lines
4.0 KiB
Go
package mpc
|
|
|
|
import (
|
|
"crypto/aes"
|
|
"crypto/cipher"
|
|
"crypto/ecdsa"
|
|
"encoding/json"
|
|
"fmt"
|
|
|
|
"github.com/onsonr/sonr/crypto/core/curves"
|
|
"github.com/onsonr/sonr/crypto/keys"
|
|
"golang.org/x/crypto/sha3"
|
|
)
|
|
|
|
// keyEnclave implements the Enclave interface
|
|
type keyEnclave struct {
|
|
// Serialized fields
|
|
Addr string `json:"address"`
|
|
PubPoint curves.Point `json:"-"`
|
|
PubBytes []byte `json:"pub_key"`
|
|
ValShare Message `json:"val_share"`
|
|
UserShare Message `json:"user_share"`
|
|
|
|
// Extra fields
|
|
nonce []byte
|
|
}
|
|
|
|
func newEnclave(valShare, userShare Message, nonce []byte) (Enclave, error) {
|
|
pubPoint, err := getAlicePubPoint(valShare)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
addr, err := computeSonrAddr(pubPoint)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return &keyEnclave{
|
|
Addr: addr,
|
|
PubPoint: pubPoint,
|
|
ValShare: valShare,
|
|
UserShare: userShare,
|
|
nonce: nonce,
|
|
}, nil
|
|
}
|
|
|
|
// Address returns the Sonr address of the keyEnclave
|
|
func (k *keyEnclave) Address() string {
|
|
return k.Addr
|
|
}
|
|
|
|
// DID returns the DID of the keyEnclave
|
|
func (k *keyEnclave) DID() keys.DID {
|
|
return keys.NewFromPubKey(k.PubKey())
|
|
}
|
|
|
|
// Export returns encrypted enclave data
|
|
func (k *keyEnclave) Export(key []byte) ([]byte, error) {
|
|
data, err := k.Serialize()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to serialize enclave: %w", err)
|
|
}
|
|
|
|
hashedKey := hashKey(key)
|
|
block, err := aes.NewCipher(hashedKey)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
aesgcm, err := cipher.NewGCM(block)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return aesgcm.Seal(nil, k.nonce, data, nil), nil
|
|
}
|
|
|
|
// Import decrypts and loads enclave data
|
|
func (k *keyEnclave) Import(data []byte, key []byte) error {
|
|
hashedKey := hashKey(key)
|
|
block, err := aes.NewCipher(hashedKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
aesgcm, err := cipher.NewGCM(block)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
decrypted, err := aesgcm.Open(nil, k.nonce, data, nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return k.Unmarshal(decrypted)
|
|
}
|
|
|
|
// IsValid returns true if the keyEnclave is valid
|
|
func (k *keyEnclave) IsValid() bool {
|
|
return k.PubPoint != nil && k.ValShare != nil && k.UserShare != nil && k.Addr != ""
|
|
}
|
|
|
|
// PubKey returns the public key of the keyEnclave
|
|
func (k *keyEnclave) PubKey() keys.PubKey {
|
|
return keys.NewPubKey(k.PubPoint)
|
|
}
|
|
|
|
// Refresh returns a new keyEnclave
|
|
func (k *keyEnclave) Refresh() (Enclave, error) {
|
|
refreshFuncVal, err := valRefreshFunc(k)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
refreshFuncUser, err := userRefreshFunc(k)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return ExecuteRefresh(refreshFuncVal, refreshFuncUser, k.nonce)
|
|
}
|
|
|
|
// Sign returns the signature of the data
|
|
func (k *keyEnclave) Sign(data []byte) ([]byte, error) {
|
|
userSign, err := userSignFunc(k, data)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
valSign, err := valSignFunc(k, data)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return ExecuteSigning(valSign, userSign)
|
|
}
|
|
|
|
// Verify returns true if the signature is valid
|
|
func (k *keyEnclave) Verify(data []byte, sig []byte) (bool, error) {
|
|
edSig, err := deserializeSignature(sig)
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
ePub, err := getEcdsaPoint(k.PubPoint.ToAffineUncompressed())
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
pk := &ecdsa.PublicKey{
|
|
Curve: ePub.Curve,
|
|
X: ePub.X,
|
|
Y: ePub.Y,
|
|
}
|
|
|
|
// Hash the message using SHA3-256
|
|
hash := sha3.New256()
|
|
hash.Write(data)
|
|
digest := hash.Sum(nil)
|
|
|
|
return ecdsa.Verify(pk, digest, edSig.R, edSig.S), nil
|
|
}
|
|
|
|
// Marshal returns the JSON encoding of keyEnclave
|
|
func (k *keyEnclave) Serialize() ([]byte, error) {
|
|
// Store compressed public point bytes before marshaling
|
|
k.PubBytes = k.PubPoint.ToAffineCompressed()
|
|
return json.Marshal(k)
|
|
}
|
|
|
|
// Unmarshal parses the JSON-encoded data and stores the result
|
|
func (k *keyEnclave) Unmarshal(data []byte) error {
|
|
if err := json.Unmarshal(data, k); err != nil {
|
|
return err
|
|
}
|
|
// Reconstruct Point from bytes
|
|
curve := curves.K256()
|
|
point, err := curve.NewIdentityPoint().FromAffineCompressed(k.PubBytes)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
k.PubPoint = point
|
|
return nil
|
|
}
|