- Rename module path from github.com/patbritton/sojorn-backend to gitlab.com/patrickbritton3/sojorn/go-backend - Updated 78 references across 41 files - Matches new GitLab repository structure
153 lines
4.7 KiB
Go
153 lines
4.7 KiB
Go
package handlers
|
|
|
|
import (
|
|
"encoding/base64"
|
|
"encoding/json"
|
|
"fmt"
|
|
"math"
|
|
"net/http"
|
|
"strconv"
|
|
|
|
"github.com/gin-gonic/gin"
|
|
"github.com/google/uuid"
|
|
"gitlab.com/patrickbritton3/sojorn/go-backend/internal/repository"
|
|
)
|
|
|
|
type KeyHandler struct {
|
|
repo *repository.UserRepository
|
|
}
|
|
|
|
func NewKeyHandler(repo *repository.UserRepository) *KeyHandler {
|
|
return &KeyHandler{repo: repo}
|
|
}
|
|
|
|
type PublishKeysRequest struct {
|
|
IdentityKeyPublic string `json:"identity_key_public" binding:"required"`
|
|
SignedPrekeyPublic string `json:"signed_prekey_public" binding:"required"`
|
|
SignedPrekeyID int `json:"signed_prekey_id"`
|
|
SignedPrekeySignature string `json:"signed_prekey_signature"`
|
|
OneTimePrekeys json.RawMessage `json:"one_time_prekeys"`
|
|
RegistrationID int `json:"registration_id" binding:"required"`
|
|
}
|
|
|
|
func (h *KeyHandler) PublishKeys(c *gin.Context) {
|
|
fmt.Println("[KEYS] POST /api/v1/keys called - uploading key bundle")
|
|
|
|
userIDStr, _ := c.Get("user_id")
|
|
userID, _ := uuid.Parse(userIDStr.(string))
|
|
fmt.Printf("[KEYS] User ID: %s\n", userID.String())
|
|
|
|
var req PublishKeysRequest
|
|
if err := c.ShouldBindJSON(&req); err != nil {
|
|
fmt.Printf("[KEYS] ERROR: Failed to parse key bundle: %v\n", err)
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
|
return
|
|
}
|
|
|
|
// Debug: Log OTK count
|
|
fmt.Printf("[KEYS] Received bundle with %d OTKs\n", len(req.OneTimePrekeys))
|
|
|
|
// CRITICAL: Log signature details
|
|
fmt.Printf("[KEYS] Received SPK signature: %s\n", req.SignedPrekeySignature)
|
|
fmt.Printf("[KEYS] SPK signature length: %d\n", len(req.SignedPrekeySignature))
|
|
|
|
// Decode and verify signature is not all zeros
|
|
sigBytes, err := base64.StdEncoding.DecodeString(req.SignedPrekeySignature)
|
|
if err != nil {
|
|
fmt.Printf("[KEYS] ERROR: Invalid signature encoding: %v\n", err)
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid signature encoding"})
|
|
return
|
|
}
|
|
|
|
fmt.Printf("[KEYS] Decoded signature length: %d bytes\n", len(sigBytes))
|
|
if len(sigBytes) > 0 {
|
|
fmt.Printf("[KEYS] Signature (first 16 bytes): %x\n", sigBytes[:int(math.Min(float64(16), float64(len(sigBytes))))])
|
|
}
|
|
|
|
allZeros := true
|
|
for _, b := range sigBytes {
|
|
if b != 0 {
|
|
allZeros = false
|
|
break
|
|
}
|
|
}
|
|
|
|
if allZeros {
|
|
fmt.Printf("[KEYS] ERROR: Signature is all zeros! Rejecting upload.\n")
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid signature - all zeros"})
|
|
return
|
|
}
|
|
|
|
fmt.Printf("[KEYS] Signature validation passed\n")
|
|
|
|
err = h.repo.UpsertKeys(c.Request.Context(), userID.String(), repository.SignalKeysInput{
|
|
IdentityKeyPublic: req.IdentityKeyPublic,
|
|
SignedPrekeyPublic: req.SignedPrekeyPublic,
|
|
SignedPrekeyID: req.SignedPrekeyID,
|
|
SignedPrekeySignature: req.SignedPrekeySignature,
|
|
OneTimePrekeys: req.OneTimePrekeys,
|
|
RegistrationID: req.RegistrationID,
|
|
})
|
|
|
|
if err != nil {
|
|
fmt.Printf("[KEYS] ERROR: Failed to upsert keys for user %s: %v\n", userID.String(), err)
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to update keys", "details": err.Error()})
|
|
return
|
|
}
|
|
|
|
fmt.Println("[KEYS] Key bundle stored successfully")
|
|
fmt.Printf("[KEYS] SUCCESS: Keys upserted for user %s\n", userID.String())
|
|
|
|
c.JSON(http.StatusOK, gin.H{"message": "Keys published successfully"})
|
|
}
|
|
|
|
func (h *KeyHandler) DeleteUsedOTK(c *gin.Context) {
|
|
userIDStr, _ := c.Get("user_id")
|
|
userID := userIDStr.(string)
|
|
|
|
keyIDStr := c.Param("keyId")
|
|
keyID, err := strconv.Atoi(keyIDStr)
|
|
if err != nil {
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid key ID"})
|
|
return
|
|
}
|
|
|
|
err = h.repo.DeleteUsedOTK(c.Request.Context(), userID, keyID)
|
|
if err != nil {
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to delete OTK"})
|
|
return
|
|
}
|
|
|
|
c.JSON(http.StatusOK, gin.H{"message": "OTK deleted successfully"})
|
|
}
|
|
|
|
func (h *KeyHandler) GetKeyBundle(c *gin.Context) {
|
|
targetUserID := c.Param("id")
|
|
fmt.Printf("[KEYS] GET request for user: %s\n", targetUserID)
|
|
|
|
requesterID, exists := c.Get("user_id")
|
|
if !exists {
|
|
fmt.Println("[KEYS] ERROR: Unauthorized - no user_id in context")
|
|
c.JSON(http.StatusUnauthorized, gin.H{"error": "Unauthorized"})
|
|
return
|
|
}
|
|
|
|
if targetUserID == "" {
|
|
fmt.Println("[KEYS] ERROR: User ID required but not provided")
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "User ID required"})
|
|
return
|
|
}
|
|
|
|
fmt.Printf("[KEYS] Fetching key bundle for user %s (requested by %s)\n", targetUserID, requesterID)
|
|
|
|
bundle, err := h.repo.GetSignalKeyBundle(c.Request.Context(), targetUserID)
|
|
if err != nil {
|
|
fmt.Printf("[KEYS] ERROR: Key bundle not found for %s: %v\n", targetUserID, err)
|
|
c.JSON(http.StatusNotFound, gin.H{"error": "Key bundle not found"})
|
|
return
|
|
}
|
|
|
|
fmt.Printf("[KEYS] SUCCESS: Returning key bundle for user %s\n", targetUserID)
|
|
c.JSON(http.StatusOK, bundle)
|
|
}
|