mirror of
https://github.com/aljazceru/nutshell.git
synced 2025-12-20 02:24:20 +01:00
* auth server * cleaning up * auth ledger class * class variables -> instance variables * annotations * add models and api route * custom amount and api prefix * add auth db * blind auth token working * jwt working * clean up * JWT works * using openid connect server * use oauth server with password flow * new realm * add keycloak docker * hopefully not garbage * auth works * auth kinda working * fix cli * auth works for send and receive * pass auth_db to Wallet * auth in info * refactor * fix supported * cache mint info * fix settings and endpoints * add description to .env.example * track changes for openid connect client * store mint in db * store credentials * clean up v1_api.py * load mint info into auth wallet * fix first login * authenticate if refresh token fails * clear auth also middleware * use regex * add cli command * pw works * persist keyset amounts * add errors.py * do not start auth server if disabled in config * upadte poetry * disvoery url * fix test * support device code flow * adopt latest spec changes * fix code flow * mint max bat dynamic * mypy ignore * fix test * do not serialize amount in authproof * all auth flows working * fix tests * submodule * refactor * test * dont sleep * test * add wallet auth tests * test differently * test only keycloak for now * fix creds * daemon * fix test * install everything * install jinja * delete wallet for every test * auth: use global rate limiter * test auth rate limit * keycloak hostname * move keycloak test data * reactivate all tests * add readme * load proofs * remove unused code * remove unused code * implement change suggestions by ok300 * add error codes * test errors
286 lines
11 KiB
Python
286 lines
11 KiB
Python
from typing import List, Literal, Optional, Tuple, Union
|
||
|
||
from loguru import logger
|
||
|
||
from ..core.base import (
|
||
BlindedMessage,
|
||
BlindedSignature,
|
||
Method,
|
||
MintQuote,
|
||
Proof,
|
||
Unit,
|
||
)
|
||
from ..core.crypto import b_dhke
|
||
from ..core.crypto.secp import PublicKey
|
||
from ..core.db import Connection
|
||
from ..core.errors import (
|
||
InvalidProofsError,
|
||
NoSecretInProofsError,
|
||
NotAllowedError,
|
||
OutputsAlreadySignedError,
|
||
SecretTooLongError,
|
||
TransactionError,
|
||
TransactionUnitError,
|
||
)
|
||
from ..core.nuts import nut20
|
||
from ..core.settings import settings
|
||
from .conditions import LedgerSpendingConditions
|
||
from .protocols import SupportsBackends, SupportsDb, SupportsKeysets
|
||
|
||
|
||
class LedgerVerification(
|
||
LedgerSpendingConditions, SupportsKeysets, SupportsDb, SupportsBackends
|
||
):
|
||
"""Verification functions for the ledger."""
|
||
|
||
async def verify_inputs_and_outputs(
|
||
self,
|
||
*,
|
||
proofs: List[Proof],
|
||
outputs: Optional[List[BlindedMessage]] = None,
|
||
conn: Optional[Connection] = None,
|
||
):
|
||
"""Checks all proofs and outputs for validity.
|
||
|
||
Warning: Does NOT check if the proofs were already spent. Use `db_write._verify_proofs_spendable` for that.
|
||
|
||
Args:
|
||
proofs (List[Proof]): List of proofs to check.
|
||
outputs (Optional[List[BlindedMessage]], optional): List of outputs to check.
|
||
Must be provided for a swap but not for a melt. Defaults to None.
|
||
conn (Optional[Connection], optional): Database connection. Defaults to None.
|
||
|
||
Raises:
|
||
Exception: Scripts did not validate.
|
||
Exception: Criteria for provided secrets not met.
|
||
Exception: Duplicate proofs provided.
|
||
Exception: BDHKE verification failed.
|
||
"""
|
||
# Verify inputs
|
||
if not proofs:
|
||
raise TransactionError("no proofs provided.")
|
||
# Verify amounts of inputs
|
||
if not all([self._verify_amount(p.amount) for p in proofs]):
|
||
raise TransactionError("invalid amount.")
|
||
# Verify secret criteria
|
||
if not all([self._verify_secret_criteria(p) for p in proofs]):
|
||
raise TransactionError("secrets do not match criteria.")
|
||
# verify that only unique proofs were used
|
||
if not self._verify_no_duplicate_proofs(proofs):
|
||
raise TransactionError("duplicate proofs.")
|
||
# Verify ecash signatures
|
||
if not all([self._verify_proof_bdhke(p) for p in proofs]):
|
||
raise InvalidProofsError()
|
||
# Verify input spending conditions
|
||
if not all([self._verify_input_spending_conditions(p) for p in proofs]):
|
||
raise TransactionError("validation of input spending conditions failed.")
|
||
|
||
if outputs is None:
|
||
# If no outputs are provided, we are melting
|
||
return
|
||
|
||
# Verify input and output amounts
|
||
self._verify_equation_balanced(proofs, outputs)
|
||
|
||
# Verify outputs
|
||
await self._verify_outputs(outputs, conn=conn)
|
||
|
||
# Verify inputs and outputs together
|
||
if not self._verify_input_output_amounts(proofs, outputs):
|
||
raise TransactionError("input amounts less than output.")
|
||
# Verify that input keyset units are the same as output keyset unit
|
||
# We have previously verified that all outputs have the same keyset id in `_verify_outputs`
|
||
assert outputs[0].id, "output id not set"
|
||
if not all(
|
||
[
|
||
self.keysets[p.id].unit == self.keysets[outputs[0].id].unit
|
||
for p in proofs
|
||
]
|
||
):
|
||
raise TransactionError("input and output keysets have different units.")
|
||
|
||
# Verify output spending conditions
|
||
if outputs and not self._verify_output_spending_conditions(proofs, outputs):
|
||
raise TransactionError("validation of output spending conditions failed.")
|
||
|
||
async def _verify_outputs(
|
||
self,
|
||
outputs: List[BlindedMessage],
|
||
skip_amount_check=False,
|
||
conn: Optional[Connection] = None,
|
||
):
|
||
"""Verify that the outputs are valid."""
|
||
logger.trace(f"Verifying {len(outputs)} outputs.")
|
||
if not outputs:
|
||
raise TransactionError("no outputs provided.")
|
||
# Verify all outputs have the same keyset id
|
||
if not all([o.id == outputs[0].id for o in outputs]):
|
||
raise TransactionError("outputs have different keyset ids.")
|
||
# Verify that the keyset id is known and active
|
||
if outputs[0].id not in self.keysets:
|
||
raise TransactionError("keyset id unknown.")
|
||
if not self.keysets[outputs[0].id].active:
|
||
raise TransactionError("keyset id inactive.")
|
||
# Verify amounts of outputs
|
||
# we skip the amount check for NUT-8 change outputs (which can have amount 0)
|
||
if not skip_amount_check:
|
||
if not all([self._verify_amount(o.amount) for o in outputs]):
|
||
raise TransactionError("invalid amount.")
|
||
# verify that only unique outputs were used
|
||
if not self._verify_no_duplicate_outputs(outputs):
|
||
raise TransactionError("duplicate outputs.")
|
||
# verify that outputs have not been signed previously
|
||
signed_before = await self._check_outputs_issued_before(outputs, conn)
|
||
if any(signed_before):
|
||
raise OutputsAlreadySignedError()
|
||
logger.trace(f"Verified {len(outputs)} outputs.")
|
||
|
||
async def _check_outputs_issued_before(
|
||
self,
|
||
outputs: List[BlindedMessage],
|
||
conn: Optional[Connection] = None,
|
||
) -> List[bool]:
|
||
"""Checks whether the provided outputs have previously been signed by the mint
|
||
(which would lead to a duplication error later when trying to store these outputs again).
|
||
|
||
Args:
|
||
outputs (List[BlindedMessage]): Outputs to check
|
||
|
||
Returns:
|
||
result (List[bool]): Whether outputs are already present in the database.
|
||
"""
|
||
async with self.db.get_connection(conn) as conn:
|
||
promises = await self.crud.get_promises(
|
||
b_s=[output.B_ for output in outputs], db=self.db, conn=conn
|
||
)
|
||
return [True if promise else False for promise in promises]
|
||
|
||
def _verify_secret_criteria(self, proof: Proof) -> Literal[True]:
|
||
"""Verifies that a secret is present and is not too long (DOS prevention)."""
|
||
if proof.secret is None or proof.secret == "":
|
||
raise NoSecretInProofsError()
|
||
if len(proof.secret) > settings.mint_max_secret_length:
|
||
raise SecretTooLongError(
|
||
f"secret too long. max: {settings.mint_max_secret_length}"
|
||
)
|
||
return True
|
||
|
||
def _verify_proof_bdhke(self, proof: Proof) -> bool:
|
||
"""Verifies that the proof of promise was issued by this ledger."""
|
||
assert proof.id in self.keysets, f"keyset {proof.id} unknown"
|
||
logger.trace(
|
||
f"Validating proof {proof.secret} with keyset"
|
||
f" {self.keysets[proof.id].id}."
|
||
)
|
||
# use the appropriate active keyset for this proof.id
|
||
private_key_amount = self.keysets[proof.id].private_keys[proof.amount]
|
||
|
||
C = PublicKey(bytes.fromhex(proof.C), raw=True)
|
||
valid = b_dhke.verify(private_key_amount, C, proof.secret)
|
||
if valid:
|
||
logger.trace("Proof verified.")
|
||
else:
|
||
logger.trace(f"Proof verification failed for {proof.secret} – {proof.C}.")
|
||
return valid
|
||
|
||
def _verify_input_output_amounts(
|
||
self, inputs: List[Proof], outputs: List[BlindedMessage]
|
||
) -> bool:
|
||
"""Verifies that inputs have at least the same amount as outputs"""
|
||
input_amount = sum([p.amount for p in inputs])
|
||
output_amount = sum([o.amount for o in outputs])
|
||
return input_amount >= output_amount
|
||
|
||
def _verify_no_duplicate_proofs(self, proofs: List[Proof]) -> bool:
|
||
secrets = [p.secret for p in proofs]
|
||
if len(secrets) != len(list(set(secrets))):
|
||
return False
|
||
return True
|
||
|
||
def _verify_no_duplicate_outputs(self, outputs: List[BlindedMessage]) -> bool:
|
||
B_s = [od.B_ for od in outputs]
|
||
if len(B_s) != len(list(set(B_s))):
|
||
return False
|
||
return True
|
||
|
||
def _verify_amount(self, amount: int) -> int:
|
||
"""Any amount used should be positive and not larger than 2^MAX_ORDER."""
|
||
valid = amount > 0 and amount < 2**settings.max_order
|
||
if not valid:
|
||
raise NotAllowedError(f"invalid amount: {amount}")
|
||
return amount
|
||
|
||
def _verify_units_match(
|
||
self,
|
||
proofs: List[Proof],
|
||
outs: Union[List[BlindedSignature], List[BlindedMessage]],
|
||
) -> Unit:
|
||
"""Verifies that the units of the inputs and outputs match."""
|
||
units_proofs = [self.keysets[p.id].unit for p in proofs]
|
||
units_outputs = [self.keysets[o.id].unit for o in outs if o.id]
|
||
if not len(set(units_proofs)) == 1:
|
||
raise TransactionUnitError("inputs have different units.")
|
||
if not len(set(units_outputs)) == 1:
|
||
raise TransactionUnitError("outputs have different units.")
|
||
if not units_proofs[0] == units_outputs[0]:
|
||
raise TransactionUnitError("input and output keysets have different units.")
|
||
return units_proofs[0]
|
||
|
||
def get_fees_for_proofs(self, proofs: List[Proof]) -> int:
|
||
if not len({self.keysets[p.id].unit for p in proofs}) == 1:
|
||
raise TransactionUnitError("inputs have different units.")
|
||
fee = (sum([self.keysets[p.id].input_fee_ppk for p in proofs]) + 999) // 1000
|
||
return fee
|
||
|
||
def _verify_equation_balanced(
|
||
self,
|
||
proofs: List[Proof],
|
||
outs: List[BlindedMessage],
|
||
) -> None:
|
||
"""Verify that Σinputs - Σoutputs = 0.
|
||
Outputs can be BlindedSignature or BlindedMessage.
|
||
"""
|
||
if not proofs:
|
||
raise TransactionError("no proofs provided.")
|
||
if not outs:
|
||
raise TransactionError("no outputs provided.")
|
||
|
||
_ = self._verify_units_match(proofs, outs)
|
||
sum_inputs = sum(self._verify_amount(p.amount) for p in proofs)
|
||
fees_inputs = self.get_fees_for_proofs(proofs)
|
||
sum_outputs = sum(self._verify_amount(p.amount) for p in outs)
|
||
if not sum_outputs + fees_inputs - sum_inputs == 0:
|
||
raise TransactionError(
|
||
f"inputs ({sum_inputs}) - fees ({fees_inputs}) vs outputs ({sum_outputs}) are not balanced."
|
||
)
|
||
|
||
def _verify_and_get_unit_method(
|
||
self, unit_str: str, method_str: str
|
||
) -> Tuple[Unit, Method]:
|
||
"""Verify that the unit is supported by the ledger."""
|
||
method = Method[method_str]
|
||
unit = Unit[unit_str]
|
||
|
||
if not any([unit == k.unit for k in self.keysets.values()]):
|
||
raise NotAllowedError(f"unit '{unit.name}' not supported in any keyset.")
|
||
|
||
if not self.backends.get(method) or unit not in self.backends[method]:
|
||
raise NotAllowedError(
|
||
f"no support for method '{method.name}' with unit '{unit.name}'."
|
||
)
|
||
|
||
return unit, method
|
||
|
||
def _verify_mint_quote_witness(
|
||
self,
|
||
quote: MintQuote,
|
||
outputs: List[BlindedMessage],
|
||
signature: Optional[str],
|
||
) -> bool:
|
||
"""Verify signature on quote id and outputs"""
|
||
if not quote.pubkey:
|
||
return True
|
||
if not signature:
|
||
return False
|
||
return nut20.verify_mint_quote(quote.quote, outputs, quote.pubkey, signature)
|