aboutsummaryrefslogtreecommitdiff
path: root/reqres.go
diff options
context:
space:
mode:
authorRasmus Dahlberg <rasmus.dahlberg@kau.se>2021-02-25 14:36:35 +0100
committerRasmus Dahlberg <rasmus.dahlberg@kau.se>2021-02-25 14:36:35 +0100
commitc05c22ddbc771e7713849cae40f9d91bfafa0503 (patch)
treeb97d11ab2a914806e6f671f9aff1cab9767b2eab /reqres.go
parentc9b4b43654f0ff26207cc63449f13298cd3c56e8 (diff)
major refactor based on README.md and TODOs
Updated types, improved units tests, isolated most test data to have it in one place, renamed and created new files to improve readability, and fixed a bunch of minor TODOs.
Diffstat (limited to 'reqres.go')
-rw-r--r--reqres.go228
1 files changed, 0 insertions, 228 deletions
diff --git a/reqres.go b/reqres.go
deleted file mode 100644
index e4ad11b..0000000
--- a/reqres.go
+++ /dev/null
@@ -1,228 +0,0 @@
-package stfe
-
-import (
- "fmt"
- "strconv"
-
- "encoding/json"
- "io/ioutil"
- "net/http"
-
- "github.com/google/trillian"
-)
-
-// AddEntryRequest is a collection of add-entry input parameters
-type AddEntryRequest struct {
- Item []byte `json:"item"` // tls-serialized StItem
- Signature []byte `json:"signature"` // serialized signature using the signature scheme below
-}
-
-// GetEntriesRequest is a collection of get-entry input parameters
-type GetEntriesRequest struct {
- Start int64 `json:"start"` // 0-based and inclusive start-index
- End int64 `json:"end"` // 0-based and inclusive end-index
-}
-
-// GetProofByHashRequest is a collection of get-proof-by-hash input parameters
-type GetProofByHashRequest struct {
- Hash []byte `json:"hash"` // leaf hash
- TreeSize int64 `json:"tree_size"` // tree head size to base proof on
-}
-
-// GetConsistencyProofRequest is a collection of get-consistency-proof input
-// parameters
-type GetConsistencyProofRequest struct {
- First int64 `json:"first"` // size of the older Merkle tree
- Second int64 `json:"second"` // size of the newer Merkle tree
-}
-
-// GetEntryResponse is an assembled log entry and its associated appendix. It
-// is identical to the add-entry request that the log once accepted.
-type GetEntryResponse AddEntryRequest
-
-// AddCosignatureRequest encapsulates a cosignature request
-type AddCosignatureRequest struct {
- Item []byte `json:"item"`
-}
-
-// newAddCosignatureRequest parses and verifies an STH cosignature request
-func (lp *LogParameters) newAddCosignatureRequest(r *http.Request) (*StItem, error) {
- var req AddCosignatureRequest
- if err := unpackJsonPost(r, &req); err != nil {
- return nil, fmt.Errorf("unpackJsonPost: %v", err)
- }
-
- // Try decoding as CosignedTreeHeadV1
- var item StItem
- if err := item.Unmarshal(req.Item); err != nil {
- return nil, fmt.Errorf("Unmarshal: %v", err)
- }
- if item.Format != StFormatCosignedTreeHeadV1 {
- return nil, fmt.Errorf("invalid StItem format: %v", item.Format)
- }
-
- // Check that witness namespace is valid
- sth := &StItem{Format: StFormatSignedTreeHeadV1, SignedTreeHeadV1: &item.CosignedTreeHeadV1.SignedTreeHeadV1}
- if len(item.CosignedTreeHeadV1.SignatureV1) != 1 {
- return nil, fmt.Errorf("invalid number of cosignatures")
- } else if namespace, ok := lp.Witnesses.Find(&item.CosignedTreeHeadV1.SignatureV1[0].Namespace); !ok {
- return nil, fmt.Errorf("unknown witness")
- } else if msg, err := sth.Marshal(); err != nil {
- return nil, fmt.Errorf("Marshal: %v", err)
- } else if err := namespace.Verify(msg, item.CosignedTreeHeadV1.SignatureV1[0].Signature); err != nil {
- return nil, fmt.Errorf("Verify: %v", err)
- }
- return &item, nil
-}
-
-// newAddEntryRequest parses and sanitizes the JSON-encoded add-entry
-// parameters from an incoming HTTP post. The request is returned if it is
-// a checksumV1 entry that is signed by a valid namespace.
-func (lp *LogParameters) newAddEntryRequest(r *http.Request) (*AddEntryRequest, error) {
- var entry AddEntryRequest
- if err := unpackJsonPost(r, &entry); err != nil {
- return nil, err
- }
-
- // Try decoding as ChecksumV1 StItem
- var item StItem
- if err := item.Unmarshal(entry.Item); err != nil {
- return nil, fmt.Errorf("StItem(%s): %v", item.Format, err)
- }
- if item.Format != StFormatChecksumV1 {
- return nil, fmt.Errorf("invalid StItem format: %s", item.Format)
- }
-
- // Check that namespace is valid for item
- if namespace, ok := lp.Submitters.Find(&item.ChecksumV1.Namespace); !ok {
- return nil, fmt.Errorf("unknown namespace: %s", item.ChecksumV1.Namespace.String())
- } else if err := namespace.Verify(entry.Item, entry.Signature); err != nil {
- return nil, fmt.Errorf("invalid namespace: %v", err)
- }
- return &entry, nil
-}
-
-// newGetEntriesRequest parses and sanitizes the URL-encoded get-entries
-// parameters from an incoming HTTP request. Too large ranges are truncated
-// based on the log's configured max range, but without taking the log's
-// current tree size into consideration (because it is not know at this point).
-func (lp *LogParameters) newGetEntriesRequest(httpRequest *http.Request) (*GetEntriesRequest, error) {
- start, err := strconv.ParseInt(httpRequest.FormValue("start"), 10, 64)
- if err != nil {
- return nil, fmt.Errorf("bad start parameter: %v", err)
- }
- end, err := strconv.ParseInt(httpRequest.FormValue("end"), 10, 64)
- if err != nil {
- return nil, fmt.Errorf("bad end parameter: %v", err)
- }
-
- if start < 0 {
- return nil, fmt.Errorf("bad parameters: start(%v) must have a non-negative value", start)
- }
- if start > end {
- return nil, fmt.Errorf("bad parameters: start(%v) must be less than or equal to end(%v)", start, end)
- }
- if end-start+1 > lp.MaxRange {
- end = start + lp.MaxRange - 1
- }
- return &GetEntriesRequest{Start: start, End: end}, nil
-}
-
-// newGetProofByHashRequest parses and sanitizes the URL-encoded
-// get-proof-by-hash parameters from an incoming HTTP request.
-func (lp *LogParameters) newGetProofByHashRequest(httpRequest *http.Request) (*GetProofByHashRequest, error) {
- size, err := strconv.ParseInt(httpRequest.FormValue("tree_size"), 10, 64)
- if err != nil {
- return nil, fmt.Errorf("bad tree_size parameter: %v", err)
- }
- if size < 1 {
- return nil, fmt.Errorf("bad tree_size parameter: must be larger than zero")
- }
- hash, err := deb64(httpRequest.FormValue("hash"))
- if err != nil {
- return nil, fmt.Errorf("bad hash parameter: %v", err)
- }
- if len(hash) != lp.HashType.Size() {
- return nil, fmt.Errorf("bad hash parameter: must be %d bytes", lp.HashType.Size())
- }
- return &GetProofByHashRequest{TreeSize: size, Hash: hash}, nil
-}
-
-// newGetConsistencyProofRequest parses and sanitizes the URL-encoded
-// get-consistency-proof-request parameters from an incoming HTTP request
-func (lp *LogParameters) newGetConsistencyProofRequest(httpRequest *http.Request) (*GetConsistencyProofRequest, error) {
- first, err := strconv.ParseInt(httpRequest.FormValue("first"), 10, 64)
- if err != nil {
- return nil, fmt.Errorf("bad first parameter: %v", err)
- }
- second, err := strconv.ParseInt(httpRequest.FormValue("second"), 10, 64)
- if err != nil {
- return nil, fmt.Errorf("bad second parameter: %v", err)
- }
-
- if first < 1 {
- return nil, fmt.Errorf("bad parameters: first(%d) must be a natural number", first)
- }
- if first >= second {
- return nil, fmt.Errorf("bad parameters: second(%d) must be larger than first(%d)", first, second)
- }
- return &GetConsistencyProofRequest{First: first, Second: second}, nil
-}
-
-// newGetEntryResponse assembles a log entry and its appendix
-func (lp *LogParameters) newGetEntryResponse(leaf, appendix []byte) (*GetEntryResponse, error) {
- return &GetEntryResponse{leaf, appendix}, nil // TODO: remove me
-}
-
-// newGetEntriesResponse assembles a get-entries response
-func (lp *LogParameters) newGetEntriesResponse(leaves []*trillian.LogLeaf) ([]*GetEntryResponse, error) {
- entries := make([]*GetEntryResponse, 0, len(leaves))
- for _, leaf := range leaves {
- entry, err := lp.newGetEntryResponse(leaf.GetLeafValue(), leaf.GetExtraData())
- if err != nil {
- return nil, err
- }
- entries = append(entries, entry)
- }
- return entries, nil
-}
-
-// newGetAnchorsResponse assembles a get-anchors response
-func (lp *LogParameters) newGetAnchorsResponse() [][]byte {
- namespaces := make([][]byte, 0, len(lp.Submitters.List()))
- for _, namespace := range lp.Submitters.List() {
- raw, err := namespace.Marshal()
- if err != nil {
- fmt.Printf("TODO: fix me and entire func\n")
- continue
- }
- namespaces = append(namespaces, raw)
- }
- return namespaces
-}
-
-// unpackJsonPost unpacks a json-encoded HTTP POST request into `unpack`
-func unpackJsonPost(r *http.Request, unpack interface{}) error {
- body, err := ioutil.ReadAll(r.Body)
- if err != nil {
- return fmt.Errorf("failed reading request body: %v", err)
- }
- if err := json.Unmarshal(body, &unpack); err != nil {
- return fmt.Errorf("failed parsing json body: %v", err)
- }
- return nil
-}
-
-// writeJsonBody writes a json-body HTTP response
-func writeJsonResponse(response interface{}, w http.ResponseWriter) error {
- json, err := json.Marshal(&response)
- if err != nil {
- return fmt.Errorf("json-encoding failed: %v", err)
- }
- w.Header().Set("Content-Type", "application/json")
- _, err = w.Write(json)
- if err != nil {
- return fmt.Errorf("failed writing json response: %v", err)
- }
- return nil
-}