Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: restore pki_env from disk whenever necessary #474

Merged
merged 1 commit into from
Jan 24, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
29 changes: 12 additions & 17 deletions crypto/src/e2e_identity/init_certificates.rs
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
use crate::{e2e_identity::CrlRegistration, prelude::MlsCentral, CryptoError, CryptoResult};
use core_crypto_keystore::entities::{E2eiAcmeCA, E2eiCrl, E2eiIntermediateCert, UniqueEntity};
use core_crypto_keystore::entities::{E2eiAcmeCA, E2eiCrl, E2eiIntermediateCert, EntityBase, UniqueEntity};
use mls_crypto_provider::MlsCryptoProvider;
use openmls_traits::OpenMlsCryptoProvider;
use std::ops::DerefMut;
use wire_e2e_identity::prelude::x509::{
Expand All @@ -17,11 +18,6 @@ impl MlsCentral {
/// # Parameters
/// * `trust_anchor_pem` - PEM certificate to anchor as a Trust Root
pub async fn e2ei_register_acme_ca(&mut self, trust_anchor_pem: String) -> CryptoResult<()> {
// Bail if we have an environment already setup
if self.e2ei_pki_env.is_some() {
return Err(CryptoError::ConsumerError);
};

let pki_env = PkiEnvironment::init(PkiEnvironmentParams {
intermediates: Default::default(),
trust_roots: Default::default(),
Expand Down Expand Up @@ -150,7 +146,13 @@ impl MlsCentral {
}

pub(crate) async fn init_pki_env(&mut self) -> CryptoResult<()> {
let keystore = self.mls_backend.key_store();
self.e2ei_pki_env
.replace(Self::restore_pki_env(&self.mls_backend).await?);
Ok(())
}

pub(crate) async fn restore_pki_env(backend: &MlsCryptoProvider) -> CryptoResult<PkiEnvironment> {
let keystore = backend.key_store();
let mut conn = keystore.borrow_conn().await?;

let mut trust_roots = vec![];
Expand All @@ -161,19 +163,15 @@ impl MlsCentral {
);
}

drop(conn);

let intermediates = keystore
.find_all::<E2eiIntermediateCert>(Default::default())
let intermediates = E2eiIntermediateCert::find_all(&mut conn, Default::default())
.await?
.into_iter()
.try_fold(vec![], |mut acc, inter| {
acc.push(x509_cert::Certificate::from_der(&inter.content)?);
CryptoResult::Ok(acc)
})?;

let crls = keystore
.find_all::<E2eiCrl>(Default::default())
let crls = E2eiCrl::find_all(&mut conn, Default::default())
.await?
.into_iter()
.try_fold(vec![], |mut acc, crl| {
Expand All @@ -188,9 +186,6 @@ impl MlsCentral {
time_of_interest: None,
};

let pki_env = PkiEnvironment::init(params).map_err(|e| CryptoError::E2eiError(e.into()))?;
self.e2ei_pki_env.replace(pki_env);

Ok(())
PkiEnvironment::init(params).map_err(|e| CryptoError::E2eiError(e.into()))
}
}
6 changes: 4 additions & 2 deletions crypto/src/e2e_identity/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -19,8 +19,8 @@
pub mod error;
pub(crate) mod id;
pub(crate) mod identity;
#[cfg(not(target_family = "wasm"))]
pub(crate) mod init_certificates;
#[cfg(not(target_family = "wasm"))]
pub(crate) mod refresh_token;
pub(crate) mod rotate;
pub(crate) mod stash;
Expand Down Expand Up @@ -538,7 +538,7 @@
#[cfg(test)]
pub mod tests {
use itertools::Itertools;
use openmls_traits::OpenMlsCryptoProvider;

Check warning on line 541 in crypto/src/e2e_identity/mod.rs

View workflow job for this annotation

GitHub Actions / wasm-build (keystore)

unused import: `openmls_traits::OpenMlsCryptoProvider`

Check warning on line 541 in crypto/src/e2e_identity/mod.rs

View workflow job for this annotation

GitHub Actions / wasm-build (mls-provider)

unused import: `openmls_traits::OpenMlsCryptoProvider`

Check warning on line 541 in crypto/src/e2e_identity/mod.rs

View workflow job for this annotation

GitHub Actions / wasm-build (crypto)

unused import: `openmls_traits::OpenMlsCryptoProvider`

Check warning on line 541 in crypto/src/e2e_identity/mod.rs

View workflow job for this annotation

GitHub Actions / proteus-wasm-test

unused import: `openmls_traits::OpenMlsCryptoProvider`

Check warning on line 541 in crypto/src/e2e_identity/mod.rs

View workflow job for this annotation

GitHub Actions / wasm-core-test

unused import: `openmls_traits::OpenMlsCryptoProvider`

Check warning on line 541 in crypto/src/e2e_identity/mod.rs

View workflow job for this annotation

GitHub Actions / wasm-core-test

unused import: `openmls_traits::OpenMlsCryptoProvider`

Check warning on line 541 in crypto/src/e2e_identity/mod.rs

View workflow job for this annotation

GitHub Actions / wasm-core-test

unused import: `openmls_traits::OpenMlsCryptoProvider`

Check warning on line 541 in crypto/src/e2e_identity/mod.rs

View workflow job for this annotation

GitHub Actions / wasm-core-test

unused import: `openmls_traits::OpenMlsCryptoProvider`
use serde_json::json;
use wasm_bindgen_test::*;

Expand Down Expand Up @@ -624,7 +624,7 @@
cc: MlsCentral,
case: &TestCase,
client_id: Option<&str>,
is_renewal: bool,

Check warning on line 627 in crypto/src/e2e_identity/mod.rs

View workflow job for this annotation

GitHub Actions / wasm-build (keystore)

unused variable: `is_renewal`

Check warning on line 627 in crypto/src/e2e_identity/mod.rs

View workflow job for this annotation

GitHub Actions / wasm-build (mls-provider)

unused variable: `is_renewal`

Check warning on line 627 in crypto/src/e2e_identity/mod.rs

View workflow job for this annotation

GitHub Actions / wasm-build (crypto)

unused variable: `is_renewal`

Check warning on line 627 in crypto/src/e2e_identity/mod.rs

View workflow job for this annotation

GitHub Actions / proteus-wasm-test

unused variable: `is_renewal`

Check warning on line 627 in crypto/src/e2e_identity/mod.rs

View workflow job for this annotation

GitHub Actions / wasm-core-test

unused variable: `is_renewal`

Check warning on line 627 in crypto/src/e2e_identity/mod.rs

View workflow job for this annotation

GitHub Actions / wasm-core-test

unused variable: `is_renewal`

Check warning on line 627 in crypto/src/e2e_identity/mod.rs

View workflow job for this annotation

GitHub Actions / wasm-core-test

unused variable: `is_renewal`

Check warning on line 627 in crypto/src/e2e_identity/mod.rs

View workflow job for this annotation

GitHub Actions / wasm-core-test

unused variable: `is_renewal`
init: impl Fn(E2eiInitWrapper) -> InitFnReturn<'_>,
// used to verify persisting the instance actually does restore it entirely
restore: impl Fn(E2eiEnrollment, MlsCentral) -> RestoreFnReturn<'a>,
Expand All @@ -634,8 +634,10 @@
if is_renewal {
let initial_refresh_token =
crate::e2e_identity::refresh_token::RefreshToken::from("initial-refresh-token".to_string());
let initial_refresh_token = E2eiRefreshToken::from(initial_refresh_token);
let initial_refresh_token =
core_crypto_keystore::entities::E2eiRefreshToken::from(initial_refresh_token);
let mut conn = cc.mls_backend.key_store().borrow_conn().await?;
use core_crypto_keystore::entities::UniqueEntity as _;
initial_refresh_token.replace(&mut conn).await.unwrap();
}
}
Expand Down
6 changes: 4 additions & 2 deletions crypto/src/mls/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -190,12 +190,13 @@ impl MlsCentral {

// Restore persisted groups if there are any
let mls_groups = Self::restore_groups(&mls_backend).await?;
let e2ei_pki_env = Some(Self::restore_pki_env(&mls_backend).await?);

Ok(Self {
mls_backend,
mls_client,
mls_groups,
e2ei_pki_env: None,
e2ei_pki_env,
callbacks: None,
})
}
Expand Down Expand Up @@ -225,12 +226,13 @@ impl MlsCentral {
None
};
let mls_groups = Self::restore_groups(&mls_backend).await?;
let e2ei_pki_env = Some(Self::restore_pki_env(&mls_backend).await?);

Ok(Self {
mls_backend,
mls_client,
mls_groups,
e2ei_pki_env: None,
e2ei_pki_env,
callbacks: None,
})
}
Expand Down
1 change: 1 addition & 0 deletions crypto/src/mls/restore.rs
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ impl MlsCentral {
#[cfg_attr(test, crate::idempotent)]
pub async fn restore_from_disk(&mut self) -> CryptoResult<()> {
self.mls_groups = Self::restore_groups(&self.mls_backend).await?;
self.e2ei_pki_env = Some(Self::restore_pki_env(&self.mls_backend).await?);
Ok(())
}

Expand Down
Loading