2023-07-18 05:53:51 +00:00
|
|
|
use core::ops::Deref;
|
|
|
|
|
|
|
|
use zeroize::{Zeroize, Zeroizing};
|
|
|
|
use rand_core::OsRng;
|
|
|
|
|
|
|
|
use ciphersuite::{
|
|
|
|
group::ff::{Field, PrimeField},
|
|
|
|
Ciphersuite, Ristretto,
|
|
|
|
};
|
|
|
|
use schnorr_signatures::SchnorrSignature;
|
|
|
|
|
|
|
|
use serde::{Serialize, Deserialize};
|
|
|
|
|
|
|
|
use reqwest::Client;
|
|
|
|
|
|
|
|
use serai_env as env;
|
|
|
|
|
|
|
|
use crate::{Service, Metadata, QueuedMessage, message_challenge, ack_challenge};
|
|
|
|
|
|
|
|
pub struct MessageQueue {
|
|
|
|
pub service: Service,
|
|
|
|
priv_key: Zeroizing<<Ristretto as Ciphersuite>::F>,
|
|
|
|
pub_key: <Ristretto as Ciphersuite>::G,
|
|
|
|
client: Client,
|
|
|
|
url: String,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl MessageQueue {
|
2023-07-22 05:12:15 +00:00
|
|
|
pub fn new(
|
|
|
|
service: Service,
|
|
|
|
mut url: String,
|
|
|
|
priv_key: Zeroizing<<Ristretto as Ciphersuite>::F>,
|
|
|
|
) -> MessageQueue {
|
2023-07-21 18:00:03 +00:00
|
|
|
// Allow MESSAGE_QUEUE_RPC to either be a full URL or just a hostname
|
2023-07-22 05:12:15 +00:00
|
|
|
// While we could stitch together multiple variables, our control over this service makes this
|
|
|
|
// fine
|
2023-07-21 18:00:03 +00:00
|
|
|
if !url.contains(':') {
|
|
|
|
url += ":2287";
|
|
|
|
}
|
|
|
|
if !url.starts_with("http://") {
|
|
|
|
url = "http://".to_string() + &url;
|
|
|
|
}
|
2023-07-18 05:53:51 +00:00
|
|
|
|
2023-07-22 05:12:15 +00:00
|
|
|
MessageQueue {
|
|
|
|
service,
|
|
|
|
pub_key: Ristretto::generator() * priv_key.deref(),
|
|
|
|
priv_key,
|
|
|
|
client: Client::new(),
|
|
|
|
url,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn from_env(service: Service) -> MessageQueue {
|
|
|
|
let url = env::var("MESSAGE_QUEUE_RPC").expect("message-queue RPC wasn't specified");
|
|
|
|
|
2023-07-18 05:53:51 +00:00
|
|
|
let priv_key: Zeroizing<<Ristretto as Ciphersuite>::F> = {
|
|
|
|
let key_str =
|
|
|
|
Zeroizing::new(env::var("MESSAGE_QUEUE_KEY").expect("message-queue key wasn't specified"));
|
|
|
|
let key_bytes = Zeroizing::new(
|
|
|
|
hex::decode(&key_str).expect("invalid message-queue key specified (wasn't hex)"),
|
|
|
|
);
|
|
|
|
let mut bytes = <<Ristretto as Ciphersuite>::F as PrimeField>::Repr::default();
|
|
|
|
bytes.copy_from_slice(&key_bytes);
|
|
|
|
let key = Zeroizing::new(
|
|
|
|
Option::from(<<Ristretto as Ciphersuite>::F as PrimeField>::from_repr(bytes))
|
|
|
|
.expect("invalid message-queue key specified"),
|
|
|
|
);
|
|
|
|
bytes.zeroize();
|
|
|
|
key
|
|
|
|
};
|
|
|
|
|
2023-07-22 05:12:15 +00:00
|
|
|
Self::new(service, url, priv_key)
|
2023-07-18 05:53:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
async fn json_call(&self, method: &'static str, params: serde_json::Value) -> serde_json::Value {
|
|
|
|
#[derive(Clone, PartialEq, Eq, Debug, Serialize, Deserialize)]
|
|
|
|
struct JsonRpcRequest {
|
2023-07-20 22:53:03 +00:00
|
|
|
jsonrpc: &'static str,
|
2023-07-18 05:53:51 +00:00
|
|
|
method: &'static str,
|
|
|
|
params: serde_json::Value,
|
|
|
|
id: u64,
|
|
|
|
}
|
|
|
|
|
|
|
|
let res = loop {
|
|
|
|
// Make the request
|
2023-07-20 22:53:03 +00:00
|
|
|
match self
|
2023-07-18 05:53:51 +00:00
|
|
|
.client
|
|
|
|
.post(&self.url)
|
2023-07-20 22:53:03 +00:00
|
|
|
.json(&JsonRpcRequest { jsonrpc: "2.0", method, params: params.clone(), id: 0 })
|
2023-07-18 05:53:51 +00:00
|
|
|
.send()
|
|
|
|
.await
|
|
|
|
{
|
2023-07-20 22:53:03 +00:00
|
|
|
Ok(req) => {
|
|
|
|
// Get the response
|
|
|
|
match req.text().await {
|
|
|
|
Ok(res) => break res,
|
|
|
|
Err(e) => {
|
|
|
|
dbg!(e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Err(e) => {
|
|
|
|
dbg!(e);
|
2023-07-18 05:53:51 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-07-20 22:53:03 +00:00
|
|
|
// Sleep for a second before trying again
|
|
|
|
tokio::time::sleep(core::time::Duration::from_secs(1)).await;
|
2023-07-18 05:53:51 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
let json =
|
|
|
|
serde_json::from_str::<serde_json::Value>(&res).expect("message-queue returned invalid JSON");
|
|
|
|
if json.get("result").is_none() {
|
|
|
|
panic!("call failed: {json}");
|
|
|
|
}
|
|
|
|
json
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn queue(&self, metadata: Metadata, msg: Vec<u8>) {
|
|
|
|
// TODO: Should this use OsRng? Deterministic or deterministic + random may be better.
|
|
|
|
let nonce = Zeroizing::new(<Ristretto as Ciphersuite>::F::random(&mut OsRng));
|
|
|
|
let nonce_pub = Ristretto::generator() * nonce.deref();
|
|
|
|
let sig = SchnorrSignature::<Ristretto>::sign(
|
|
|
|
&self.priv_key,
|
|
|
|
nonce,
|
|
|
|
message_challenge(
|
|
|
|
metadata.from,
|
|
|
|
self.pub_key,
|
|
|
|
metadata.to,
|
|
|
|
&metadata.intent,
|
|
|
|
&msg,
|
|
|
|
nonce_pub,
|
|
|
|
),
|
|
|
|
)
|
|
|
|
.serialize();
|
|
|
|
|
|
|
|
let json = self.json_call("queue", serde_json::json!([metadata, msg, sig])).await;
|
|
|
|
if json.get("result") != Some(&serde_json::Value::Bool(true)) {
|
|
|
|
panic!("failed to queue message: {json}");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-09-27 15:10:12 +00:00
|
|
|
pub async fn next(&self) -> QueuedMessage {
|
2023-07-18 05:53:51 +00:00
|
|
|
loop {
|
2023-09-27 15:10:12 +00:00
|
|
|
let json = self.json_call("next", serde_json::json!([self.service])).await;
|
2023-07-18 05:53:51 +00:00
|
|
|
|
|
|
|
// Convert from a Value to a type via reserialization
|
|
|
|
let msg: Option<QueuedMessage> = serde_json::from_str(
|
|
|
|
&serde_json::to_string(
|
|
|
|
&json.get("result").expect("successful JSON RPC call didn't have result"),
|
|
|
|
)
|
|
|
|
.unwrap(),
|
|
|
|
)
|
|
|
|
.expect("next didn't return an Option<QueuedMessage>");
|
|
|
|
|
2023-07-25 22:09:23 +00:00
|
|
|
// If there wasn't a message, check again in 1s
|
2023-07-18 05:53:51 +00:00
|
|
|
let Some(msg) = msg else {
|
2023-07-25 22:09:23 +00:00
|
|
|
tokio::time::sleep(core::time::Duration::from_secs(1)).await;
|
2023-07-18 05:53:51 +00:00
|
|
|
continue;
|
|
|
|
};
|
|
|
|
|
|
|
|
// Verify the message
|
|
|
|
// Verify the sender is sane
|
|
|
|
if matches!(self.service, Service::Processor(_)) {
|
2023-08-29 21:05:01 +00:00
|
|
|
assert_eq!(
|
|
|
|
msg.from,
|
|
|
|
Service::Coordinator,
|
|
|
|
"non-coordinator sent us (a processor) a message"
|
|
|
|
);
|
2023-07-18 05:53:51 +00:00
|
|
|
} else {
|
|
|
|
assert!(
|
|
|
|
matches!(msg.from, Service::Processor(_)),
|
2023-08-29 21:05:01 +00:00
|
|
|
"non-processor sent us (coordinator) a message"
|
2023-07-18 05:53:51 +00:00
|
|
|
);
|
|
|
|
}
|
|
|
|
// TODO: Verify the sender's signature
|
|
|
|
|
|
|
|
return msg;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub async fn ack(&self, id: u64) {
|
|
|
|
// TODO: Should this use OsRng? Deterministic or deterministic + random may be better.
|
|
|
|
let nonce = Zeroizing::new(<Ristretto as Ciphersuite>::F::random(&mut OsRng));
|
|
|
|
let nonce_pub = Ristretto::generator() * nonce.deref();
|
|
|
|
let sig = SchnorrSignature::<Ristretto>::sign(
|
|
|
|
&self.priv_key,
|
|
|
|
nonce,
|
|
|
|
ack_challenge(self.service, self.pub_key, id, nonce_pub),
|
|
|
|
)
|
|
|
|
.serialize();
|
|
|
|
|
2023-07-20 22:53:03 +00:00
|
|
|
let json = self.json_call("ack", serde_json::json!([self.service, id, sig])).await;
|
2023-07-18 05:53:51 +00:00
|
|
|
if json.get("result") != Some(&serde_json::Value::Bool(true)) {
|
|
|
|
panic!("failed to ack message {id}: {json}");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|