mirror of
https://github.com/onsonr/sonr.git
synced 2025-03-10 21:09:11 +00:00
* feat: enable DID auth middleware * feat: implement passkey creation flow * feat: persist user address in cookie and retrieve user profile using address cookie * feat: implement human verification challenge during session initialization * refactor: remove unnecessary random number generation in profile creation * refactor: rename credential validation handler and update related routes * feat: improve profile validation and user experience * feat: add page rendering for profile and passkey creation * refactor: remove unused register handler and update routes * refactor: remove unused imports and simplify credential validation * fix: Correct insecure gRPC client connection * refactor: rename models files for better organization * refactor: refactor grpc client creation and management * refactor: refactor common clients package * <no value> * feat: add CapAccount, CapInterchain, CapVault enums * feat: add ChainId to ResAccount and ResInterchain * feat: add asset code to resource account enumeration * refactor: rename services package to providers * feat: implement gateway database interactions * refactor: move gateway repository to internal/gateway * refactor: Migrate database provider to use sqlx * refactor: Rename Vaults to VaultProvider in HTTPContext struct * refactor: Migrate from GORM to sqlc Queries in database context methods * refactor: Replace GORM with standard SQL and simplify database initialization * refactor: Migrate session management from GORM to sqlc with type conversion * refactor: Update import paths and model references in context package * fix: Resolve session type conversion and middleware issues * refactor: Migrate database from GORM to sqlx * refactor: Move models to pkg/common, improve code structure * refactor: move repository package to internal directory * refactor: move gateway internal packages to context directory * refactor: migrate database provider to use sqlx queries * feat: add session ID to HTTP context and use it to load session data * feat: implement vault creation API endpoint * feat: add DIDKey generation from PubKey * refactor: remove unused DIDAuth components * refactor: move DID auth controller to vault context * chore: remove unused DIDAuth package * refactor: improve clarity of enclave refresh function * feat: implement nonce-based key encryption for improved security * feat: Add Export and Import methods with comprehensive tests for Enclave * fix: Validate AES key length in keyshare encryption and decryption * fix: Resolve key length validation by hashing input keys * refactor: Update keyshare import to use protocol decoding * feat: Refactor enclave encryption to support full enclave export/import * refactor: Simplify Enclave interface methods by removing role parameter * refactor: remove unnecessary serialization from enclave interface * refactor: rename models package in gateway context * refactor: rename keystore vault constants * refactor: remove context parameter from Resolver methods * feat: add CurrentBlock context function and update related components * refactor: rename resolver.go to resolvers.go * feat: Add SQLite random() generation for session and profile initialization * refactor: Update SQL queries to use SQLite-style parameter placeholders * refactor: Replace '?' placeholders with '$n' PostgreSQL parameter syntax * <no value> * refactor: refactor gateway to use middleware for database interactions and improve modularity * feat: implement gateway for Sonr highway * refactor: Remove unused gateway context and refactor cookie/header handling * refactor: improve server initialization and middleware handling * feat: implement human verification for profile creation * feat: implement session management middleware * refactor: refactor common models and config to internal package * refactor: move env config to internal/config * refactor: move database-related code to directory * refactor: move IPFS client to common package and improve code structure * refactor: move querier to common package and rename to chain_query * refactor: move webworker model to internal/models * feat: add initial view template for Sonr.ID * docs(concepts): Add documentation for cosmos-proto * docs: move IBC transfer documentation to tools section * refactor: rename initpkl.go to pkl_init.go for better naming consistency * docs(theme): update dark mode toggle icons * refactor: update sqlite3 driver to ncruces/go-sqlite3 * feat: add Vault model and database interactions * refactor: Improve SQLite schema with better constraints and indexes * chore: update project dependencies * fix: use grpc.WithInsecure() for gRPC connection * config: set localhost as default Sonr gRPC URL * refactor: improve gateway middleware and refactor server initialization * refactor: Remove foreign key pragma from schema SQL * refactor: Remove foreign key constraints from database schema * refactor: Convert primary key columns from INTEGER to TEXT * refactor: Remove unnecessary redirect in error handling
143 lines
3.6 KiB
Go
143 lines
3.6 KiB
Go
package ucan
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
)
|
|
|
|
// Attenuations is a list of attenuations
|
|
type Attenuations []Attenuation
|
|
|
|
func (att Attenuations) String() string {
|
|
str := ""
|
|
for _, a := range att {
|
|
str += fmt.Sprintf("%s\n", a)
|
|
}
|
|
return str
|
|
}
|
|
|
|
// Contains is true if all attenuations in b are contained
|
|
func (att Attenuations) Contains(b Attenuations) bool {
|
|
// fmt.Printf("%scontains\n%s?\n\n", att, b)
|
|
LOOP:
|
|
for _, bb := range b {
|
|
for _, aa := range att {
|
|
if aa.Contains(bb) {
|
|
// fmt.Printf("%s contains %s\n", aa, bb)
|
|
continue LOOP
|
|
} else if aa.Rsc.Contains(bb.Rsc) {
|
|
// fmt.Printf("%s < %s\n", aa, bb)
|
|
// fmt.Printf("rscEq:%t rscContains: %t capContains:%t\n", aa.Rsc.Type() == bb.Rsc.Type(), aa.Rsc.Contains(bb.Rsc), aa.Cap.Contains(bb.Cap))
|
|
return false
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
return true
|
|
}
|
|
|
|
// AttenuationConstructorFunc is a function that creates an attenuation from a map
|
|
// Users of this package provide an Attenuation Constructor to the parser to
|
|
// bind attenuation logic to a UCAN
|
|
type AttenuationConstructorFunc func(v map[string]interface{}) (Attenuation, error)
|
|
|
|
// Attenuation is a capability on a resource
|
|
type Attenuation struct {
|
|
Cap Capability
|
|
Rsc Resource
|
|
}
|
|
|
|
// String formats an attenuation as a string
|
|
func (a Attenuation) String() string {
|
|
return fmt.Sprintf("cap:%s %s:%s", a.Cap, a.Rsc.Type(), a.Rsc.Value())
|
|
}
|
|
|
|
// Contains returns true if both
|
|
func (a Attenuation) Contains(b Attenuation) bool {
|
|
return a.Rsc.Contains(b.Rsc) && a.Cap.Contains(b.Cap)
|
|
}
|
|
|
|
// MarshalJSON implements the json.Marshaller interface
|
|
func (a Attenuation) MarshalJSON() ([]byte, error) {
|
|
return json.Marshal(map[string]interface{}{
|
|
a.Rsc.Type(): a.Rsc.Value(),
|
|
CapKey: a.Cap.String(),
|
|
})
|
|
}
|
|
|
|
// Resource is a unique identifier for a thing, usually stored state. Resources
|
|
// are organized by string types
|
|
type Resource interface {
|
|
Type() string
|
|
Value() string
|
|
Contains(b Resource) bool
|
|
}
|
|
|
|
// Capability is an action users can perform
|
|
type Capability interface {
|
|
// A Capability must be expressable as a string
|
|
String() string
|
|
// Capabilities must be comparable to other same-type capabilities
|
|
Contains(b Capability) bool
|
|
}
|
|
|
|
// NestedCapabilities is a basic implementation of the Capabilities interface
|
|
// based on a hierarchal list of strings ordered from most to least capable
|
|
// It is both a capability and a capability factory with the .Cap method
|
|
type NestedCapabilities struct {
|
|
cap string
|
|
idx int
|
|
hierarchy *[]string
|
|
}
|
|
|
|
// assert at compile-time NestedCapabilities implements Capability
|
|
var _ Capability = (*NestedCapabilities)(nil)
|
|
|
|
// NewNestedCapabilities creates a set of NestedCapabilities
|
|
func NewNestedCapabilities(strs ...string) NestedCapabilities {
|
|
return NestedCapabilities{
|
|
cap: strs[0],
|
|
idx: 0,
|
|
hierarchy: &strs,
|
|
}
|
|
}
|
|
|
|
// Cap creates a new capability from the hierarchy
|
|
func (nc NestedCapabilities) Cap(str string) Capability {
|
|
idx := -1
|
|
for i, c := range *nc.hierarchy {
|
|
if c == str {
|
|
idx = i
|
|
break
|
|
}
|
|
}
|
|
if idx == -1 {
|
|
panic(fmt.Sprintf("%s is not a nested capability. must be one of: %v", str, *nc.hierarchy))
|
|
}
|
|
|
|
return NestedCapabilities{
|
|
cap: str,
|
|
idx: idx,
|
|
hierarchy: nc.hierarchy,
|
|
}
|
|
}
|
|
|
|
// String returns the Capability value as a string
|
|
func (nc NestedCapabilities) String() string {
|
|
return nc.cap
|
|
}
|
|
|
|
// Contains returns true if cap is equal or less than the NestedCapability value
|
|
func (nc NestedCapabilities) Contains(cap Capability) bool {
|
|
str := cap.String()
|
|
for i, c := range *nc.hierarchy {
|
|
if c == str {
|
|
if i >= nc.idx {
|
|
return true
|
|
}
|
|
return false
|
|
}
|
|
}
|
|
return false
|
|
}
|