selfsdk 0.0.136 → 0.0.141
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/client.rb +37 -14
- data/lib/crypto.rb +112 -0
- data/lib/messages/authentication_req.rb +1 -1
- data/lib/messages/base.rb +4 -0
- data/lib/messages/fact_request.rb +8 -7
- data/lib/messages/message.rb +2 -1
- data/lib/messaging.rb +8 -2
- data/lib/selfsdk.rb +1 -0
- data/lib/services/auth.rb +5 -2
- data/lib/services/facts.rb +5 -2
- metadata +16 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 1fc84c8ad47b159c7f07f33226c1273bf30202f3b999ceba02ef51f6b35763fb
|
4
|
+
data.tar.gz: 4c88fbad5ffa05cc69977554d454ca7fcc796663400f2e74b770879afe05c2a7
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: c5f9b8cf446fb87a089d2094449691cd73806af84ce5d3f712a0357a0bdc5c4b2f7fef0dd6552591d56c4c5dd07fcaadcad02173b67b500f07ae80aec519fc2f
|
7
|
+
data.tar.gz: ee291b8ca0f22787067ae2edca5a59fee3fea4950a06cfd921c00c9d283d7c769cefeac7dd8bcee0bd2eeee7784fab307a52919d81f87942b8c8ccd4eff6d045
|
data/lib/client.rb
CHANGED
@@ -65,6 +65,34 @@ module SelfSDK
|
|
65
65
|
i[:public_keys]
|
66
66
|
end
|
67
67
|
|
68
|
+
def post(endpoint, body)
|
69
|
+
res = nil
|
70
|
+
loop do
|
71
|
+
res = HTTParty.post("#{@self_url}#{endpoint}",
|
72
|
+
headers: {
|
73
|
+
'Content-Type' => 'application/json',
|
74
|
+
'Authorization' => "Bearer #{@jwt.auth_token}"
|
75
|
+
},
|
76
|
+
body: body)
|
77
|
+
break if res.code != 503
|
78
|
+
sleep 2
|
79
|
+
end
|
80
|
+
return res
|
81
|
+
end
|
82
|
+
|
83
|
+
def get(endpoint)
|
84
|
+
res = nil
|
85
|
+
loop do
|
86
|
+
res = HTTParty.get("#{@self_url}#{endpoint}", headers: {
|
87
|
+
'Content-Type' => 'application/json',
|
88
|
+
'Authorization' => "Bearer #{@jwt.auth_token}"
|
89
|
+
})
|
90
|
+
break if res.code != 503
|
91
|
+
sleep 2
|
92
|
+
end
|
93
|
+
return res
|
94
|
+
end
|
95
|
+
|
68
96
|
# Lists all public keys stored on self for the given ID
|
69
97
|
#
|
70
98
|
# @param id [string] identity id
|
@@ -74,6 +102,15 @@ module SelfSDK
|
|
74
102
|
sg.key_by_id(kid)
|
75
103
|
end
|
76
104
|
|
105
|
+
# Get the active public key for a device
|
106
|
+
#
|
107
|
+
# @param id [string] identity id
|
108
|
+
def device_public_key(id, did)
|
109
|
+
i = entity(id)
|
110
|
+
sg = SelfSDK::SignatureGraph.new(i[:history])
|
111
|
+
sg.key_by_device(did)
|
112
|
+
end
|
113
|
+
|
77
114
|
private
|
78
115
|
|
79
116
|
def get_identity(endpoint)
|
@@ -86,20 +123,6 @@ module SelfSDK
|
|
86
123
|
body
|
87
124
|
end
|
88
125
|
|
89
|
-
def get(endpoint)
|
90
|
-
HTTParty.get("#{@self_url}#{endpoint}", headers: {
|
91
|
-
'Content-Type' => 'application/json',
|
92
|
-
'Authorization' => "Bearer #{@jwt.auth_token}"
|
93
|
-
})
|
94
|
-
end
|
95
126
|
|
96
|
-
def post(endpoint, body)
|
97
|
-
HTTParty.post("#{@self_url}#{endpoint}",
|
98
|
-
headers: {
|
99
|
-
'Content-Type' => 'application/json',
|
100
|
-
'Authorization' => "Bearer #{@jwt.auth_token}"
|
101
|
-
},
|
102
|
-
body: body)
|
103
|
-
end
|
104
127
|
end
|
105
128
|
end
|
data/lib/crypto.rb
ADDED
@@ -0,0 +1,112 @@
|
|
1
|
+
require 'self_crypto'
|
2
|
+
|
3
|
+
module SelfSDK
|
4
|
+
class Crypto
|
5
|
+
def initialize(client, device, storage_folder, storage_key)
|
6
|
+
@client = client
|
7
|
+
@device = device
|
8
|
+
@storage_key = storage_key
|
9
|
+
@storage_folder = storage_folder
|
10
|
+
|
11
|
+
if File.exist?(account_path)
|
12
|
+
# 1a) if alice's account file exists load the pickle from the file
|
13
|
+
@account = SelfCrypto::Account.from_pickle(File.read(account_path), @storage_key)
|
14
|
+
else
|
15
|
+
# 1b-i) if create a new account for alice if one doesn't exist already
|
16
|
+
@account = SelfCrypto::Account.from_seed(@client.jwt.key)
|
17
|
+
|
18
|
+
# 1b-ii) generate some keys for alice and publish them
|
19
|
+
@account.gen_otk(100)
|
20
|
+
|
21
|
+
# 1b-iii) convert those keys to json
|
22
|
+
keys = @account.otk['curve25519'].map{|k,v| {id: k, key: v}}.to_json
|
23
|
+
|
24
|
+
# 1b-iv) post those keys to POST /v1/identities/<selfid>/devices/1/pre_keys/
|
25
|
+
@client.post("/v1/apps/#{@client.jwt.id}/devices/#{@device}/pre_keys", keys)
|
26
|
+
|
27
|
+
# 1b-v) store the account to a file
|
28
|
+
File.write(account_path, @account.to_pickle(storage_key))
|
29
|
+
end
|
30
|
+
end
|
31
|
+
|
32
|
+
def encrypt(message, recipient, recipient_device)
|
33
|
+
session_file_name = session_path(recipient, recipient_device)
|
34
|
+
|
35
|
+
if File.exist?(session_file_name)
|
36
|
+
# 2a) if bob's session file exists load the pickle from the file
|
37
|
+
session_with_bob = SelfCrypto::Session.from_pickle(File.read(session_file_name), @storage_key)
|
38
|
+
else
|
39
|
+
# 2b-i) if you have not previously sent or recevied a message to/from bob,
|
40
|
+
# you must get his identity key from GET /v1/identities/bob/
|
41
|
+
ed25519_identity_key = @client.device_public_key(recipient, recipient_device)
|
42
|
+
|
43
|
+
# 2b-ii) get a one time key for bob
|
44
|
+
res = @client.get("/v1/identities/#{recipient}/devices/#{recipient_device}/pre_keys")
|
45
|
+
|
46
|
+
if res.code != 200
|
47
|
+
Selfid.logger.error "identity response : #{res.body[:message]}"
|
48
|
+
raise "could not get identity pre_keys"
|
49
|
+
end
|
50
|
+
|
51
|
+
one_time_key = JSON.parse(res.body)["key"]
|
52
|
+
|
53
|
+
# 2b-iii) convert bobs ed25519 identity key to a curve25519 key
|
54
|
+
curve25519_identity_key = SelfCrypto::Util.ed25519_pk_to_curve25519(ed25519_identity_key.raw_public_key)
|
55
|
+
|
56
|
+
# 2b-iv) create the session with bob
|
57
|
+
session_with_bob = @account.outbound_session(curve25519_identity_key, one_time_key)
|
58
|
+
|
59
|
+
# 2b-v) store the session to a file
|
60
|
+
File.write(session_file_name, session_with_bob.to_pickle(@storage_key))
|
61
|
+
end
|
62
|
+
|
63
|
+
# 3) create a group session and set the identity of the account youre using
|
64
|
+
gs = SelfCrypto::GroupSession.new("#{@client.jwt.id}:#{@device}")
|
65
|
+
|
66
|
+
# 4) add all recipients and their sessions
|
67
|
+
gs.add_participant("#{recipient}:#{recipient_device}", session_with_bob)
|
68
|
+
|
69
|
+
# 5) encrypt a message
|
70
|
+
gs.encrypt(message).to_s
|
71
|
+
end
|
72
|
+
|
73
|
+
def decrypt(message, sender, sender_device)
|
74
|
+
session_file_name = session_path(sender, sender_device)
|
75
|
+
|
76
|
+
if File.exist?(session_file_name)
|
77
|
+
# 7a) if carol's session file exists load the pickle from the file
|
78
|
+
session_with_bob = SelfCrypto::Session.from_pickle(File.read(session_file_name), @storage_key)
|
79
|
+
else
|
80
|
+
# 7b-i) if you have not previously sent or received a message to/from bob,
|
81
|
+
# you should extract the initial message from the group message intended
|
82
|
+
# for your account id.
|
83
|
+
m = SelfCrypto::GroupMessage.new(message.to_s).get_message("#{@client.jwt.id}:#{@device}")
|
84
|
+
|
85
|
+
# 7b-ii) use the initial message to create a session for bob or carol
|
86
|
+
session_with_bob = @account.inbound_session(m)
|
87
|
+
|
88
|
+
# 7b-iii) store the session to a file
|
89
|
+
File.write(session_file_name, session_with_bob.to_pickle(@storage_key))
|
90
|
+
end
|
91
|
+
|
92
|
+
# 8) create a group session and set the identity of the account you're using
|
93
|
+
gs = SelfCrypto::GroupSession.new("#{@client.jwt.id}:#{@device}")
|
94
|
+
|
95
|
+
# 9) add all recipients and their sessions
|
96
|
+
gs.add_participant("#{sender}:#{sender_device}", session_with_bob)
|
97
|
+
|
98
|
+
# 10) decrypt the message ciphertext
|
99
|
+
gs.decrypt("#{sender}:#{sender_device}", message).to_s
|
100
|
+
end
|
101
|
+
|
102
|
+
private
|
103
|
+
|
104
|
+
def account_path
|
105
|
+
"#{@storage_folder}/account.pickle"
|
106
|
+
end
|
107
|
+
|
108
|
+
def session_path(selfid, device)
|
109
|
+
"#{@storage_folder}/#{selfid}:#{device}-session.pickle"
|
110
|
+
end
|
111
|
+
end
|
112
|
+
end
|
data/lib/messages/base.rb
CHANGED
@@ -93,19 +93,20 @@ module SelfSDK
|
|
93
93
|
end
|
94
94
|
@to_device = devices.first
|
95
95
|
|
96
|
-
|
97
|
-
|
98
|
-
|
99
|
-
|
100
|
-
|
96
|
+
if @intermediary.nil?
|
97
|
+
recipient = "#{@to}:#{@to_device}"
|
98
|
+
ciphertext = encrypt_message(@jwt.prepare(body), @to, @to_device)
|
99
|
+
else
|
100
|
+
recipient = "#{@intermediary}:#{@to_device}"
|
101
|
+
ciphertext = encrypt_message(@jwt.prepare(body), @intermediary, @to_device)
|
102
|
+
end
|
101
103
|
|
102
104
|
Msgproto::Message.new(
|
103
105
|
type: Msgproto::MsgType::MSG,
|
104
106
|
id: @id,
|
105
107
|
sender: "#{@jwt.id}:#{@messaging.device_id}",
|
106
108
|
recipient: recipient,
|
107
|
-
ciphertext:
|
108
|
-
)
|
109
|
+
ciphertext: ciphertext )
|
109
110
|
end
|
110
111
|
end
|
111
112
|
end
|
data/lib/messages/message.rb
CHANGED
@@ -11,7 +11,8 @@ module SelfSDK
|
|
11
11
|
body = if input.is_a? String
|
12
12
|
input
|
13
13
|
else
|
14
|
-
input.
|
14
|
+
issuer = input.recipient.split(":")
|
15
|
+
messaging.encryption_client.decrypt(input.ciphertext, issuer.first, issuer.last)
|
15
16
|
end
|
16
17
|
|
17
18
|
jwt = JSON.parse(body, symbolize_names: true)
|
data/lib/messaging.rb
CHANGED
@@ -4,6 +4,7 @@ require 'json'
|
|
4
4
|
require 'monitor'
|
5
5
|
require 'faye/websocket'
|
6
6
|
require 'fileutils'
|
7
|
+
require_relative 'crypto'
|
7
8
|
require_relative 'messages/message'
|
8
9
|
require_relative 'proto/auth_pb'
|
9
10
|
require_relative 'proto/message_pb'
|
@@ -18,16 +19,18 @@ module SelfSDK
|
|
18
19
|
DEFAULT_STORAGE_DIR="./.self_storage"
|
19
20
|
ON_DEMAND_CLOSE_CODE=3999
|
20
21
|
|
21
|
-
attr_accessor :client, :jwt, :device_id, :ack_timeout, :timeout, :type_observer, :uuid_observer
|
22
|
+
attr_accessor :client, :jwt, :device_id, :ack_timeout, :timeout, :type_observer, :uuid_observer, :encryption_client
|
22
23
|
|
23
24
|
# RestClient initializer
|
24
25
|
#
|
25
26
|
# @param url [string] self-messaging url
|
26
27
|
# @params client [Object] SelfSDK::Client object
|
27
28
|
# @option opts [string] :storage_dir the folder where encryption sessions and settings will be stored
|
29
|
+
# @params storage_key [String] seed to encrypt messaging
|
30
|
+
# @params storage_folder [String] folder to perist messaging encryption
|
28
31
|
# @option opts [Bool] :auto_reconnect Automatically reconnects to websocket if connection is lost (defaults to true).
|
29
32
|
# @option opts [String] :device_id The device id to be used by the app defaults to "1".
|
30
|
-
def initialize(url, client, options = {})
|
33
|
+
def initialize(url, client, storage_key, options = {})
|
31
34
|
@mon = Monitor.new
|
32
35
|
@url = url
|
33
36
|
@messages = {}
|
@@ -45,6 +48,9 @@ module SelfSDK
|
|
45
48
|
@offset = read_offset
|
46
49
|
|
47
50
|
FileUtils.mkdir_p @storage_dir unless File.exist? @storage_dir
|
51
|
+
unless options.include? :no_crypto
|
52
|
+
@encryption_client = Crypto.new(@client, @device_id, @storage_dir, storage_key)
|
53
|
+
end
|
48
54
|
|
49
55
|
if options.include? :ws
|
50
56
|
@ws = options[:ws]
|
data/lib/selfsdk.rb
CHANGED
@@ -53,6 +53,7 @@ module SelfSDK
|
|
53
53
|
unless messaging_url.nil?
|
54
54
|
@messaging_client = MessagingClient.new(messaging_url,
|
55
55
|
@client,
|
56
|
+
storage_key,
|
56
57
|
storage_dir: opts.fetch(:storage_dir, MessagingClient::DEFAULT_STORAGE_DIR),
|
57
58
|
auto_reconnect: opts.fetch(:auto_reconnect, MessagingClient::DEFAULT_AUTO_RECONNECT),
|
58
59
|
device_id: opts.fetch(:device_id, MessagingClient::DEFAULT_DEVICE))
|
data/lib/services/auth.rb
CHANGED
@@ -39,13 +39,16 @@ module SelfSDK
|
|
39
39
|
# @return [String, String] conversation id or encoded body.
|
40
40
|
def request(selfid, opts = {}, &block)
|
41
41
|
SelfSDK.logger.info "authenticating #{selfid}"
|
42
|
-
|
42
|
+
rq = opts.fetch(:request, true)
|
43
|
+
if rq
|
44
|
+
raise "You're not permitting connections from #{selfid}" unless @messaging_service.is_permitted?(selfid)
|
45
|
+
end
|
43
46
|
|
44
47
|
req = SelfSDK::Messages::AuthenticationReq.new(@messaging)
|
45
48
|
req.populate(selfid, opts)
|
46
49
|
|
47
50
|
body = @client.jwt.prepare(req.body)
|
48
|
-
return body unless
|
51
|
+
return body unless rq
|
49
52
|
return req.send_message if opts.fetch(:async, false)
|
50
53
|
|
51
54
|
# when a block is given the request will always be asynchronous.
|
data/lib/services/facts.rb
CHANGED
@@ -41,13 +41,16 @@ module SelfSDK
|
|
41
41
|
# @return [Object] SelfSDK:::Messages::FactRequest
|
42
42
|
def request(selfid, facts, opts = {}, &block)
|
43
43
|
SelfSDK.logger.info "authenticating #{selfid}"
|
44
|
-
|
44
|
+
rq = opts.fetch(:request, true)
|
45
|
+
if rq
|
46
|
+
raise "You're not permitting connections from #{selfid}" unless @messaging_service.is_permitted?(selfid)
|
47
|
+
end
|
45
48
|
|
46
49
|
req = SelfSDK::Messages::FactRequest.new(@messaging)
|
47
50
|
req.populate(selfid, prepare_facts(facts), opts)
|
48
51
|
|
49
52
|
body = @client.jwt.prepare(req.body)
|
50
|
-
return body unless
|
53
|
+
return body unless rq
|
51
54
|
|
52
55
|
# when a block is given the request will always be asynchronous.
|
53
56
|
if block_given?
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: selfsdk
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.0.
|
4
|
+
version: 0.0.141
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Aldgate Ventures
|
@@ -10,6 +10,20 @@ bindir: bin
|
|
10
10
|
cert_chain: []
|
11
11
|
date: 2011-09-29 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
|
+
- !ruby/object:Gem::Dependency
|
14
|
+
name: self_crypto
|
15
|
+
requirement: !ruby/object:Gem::Requirement
|
16
|
+
requirements:
|
17
|
+
- - ">="
|
18
|
+
- !ruby/object:Gem::Version
|
19
|
+
version: '0'
|
20
|
+
type: :runtime
|
21
|
+
prerelease: false
|
22
|
+
version_requirements: !ruby/object:Gem::Requirement
|
23
|
+
requirements:
|
24
|
+
- - ">="
|
25
|
+
- !ruby/object:Gem::Version
|
26
|
+
version: '0'
|
13
27
|
- !ruby/object:Gem::Dependency
|
14
28
|
name: async
|
15
29
|
requirement: !ruby/object:Gem::Requirement
|
@@ -299,6 +313,7 @@ files:
|
|
299
313
|
- lib/acl.rb
|
300
314
|
- lib/authenticated.rb
|
301
315
|
- lib/client.rb
|
316
|
+
- lib/crypto.rb
|
302
317
|
- lib/jwt_service.rb
|
303
318
|
- lib/log.rb
|
304
319
|
- lib/messages/attestation.rb
|