107 lines
4.2 KiB
Python
107 lines
4.2 KiB
Python
from uuid import UUID, uuid4
|
|
from pydantic import BaseModel
|
|
from src.customer import Customer
|
|
from src.models import NKodePolicy, KeypadSize
|
|
from src.user import User
|
|
from src.user_cipher_keys import UserCipherKeys
|
|
from src.user_signup_session import UserSignupSession
|
|
from src.user_interface import UserInterface
|
|
from src.customer_attributes import CustomerAttributes
|
|
|
|
|
|
class NKodeAPI(BaseModel):
|
|
customers: dict[UUID, Customer] = {}
|
|
signup_sessions: dict[UUID, UserSignupSession] = {}
|
|
|
|
def create_new_customer(self, keypad_size: KeypadSize, nkode_policy: NKodePolicy) -> UUID:
|
|
new_customer = Customer(
|
|
customer_id=uuid4(),
|
|
attributes=CustomerAttributes.new(keypad_size),
|
|
users={},
|
|
nkode_policy=nkode_policy
|
|
)
|
|
self.customers[new_customer.customer_id] = new_customer
|
|
|
|
return new_customer.customer_id
|
|
|
|
def generate_signup_interface(self, customer_id: UUID) -> tuple[UUID, list[int]]:
|
|
assert (customer_id in self.customers.keys())
|
|
customer = self.customers[customer_id]
|
|
login_interface = UserInterface.new(customer.attributes.keypad_size)
|
|
set_interface = login_interface.sign_up_interface()
|
|
new_session = UserSignupSession(
|
|
session_id=uuid4(),
|
|
login_interface=login_interface,
|
|
set_interface=set_interface.interface,
|
|
customer_id=customer_id,
|
|
keypad_size=set_interface.keypad_size,
|
|
)
|
|
self.signup_sessions[new_session.session_id] = new_session
|
|
return new_session.session_id, new_session.set_interface
|
|
|
|
def set_nkode(
|
|
self,
|
|
username: str,
|
|
customer_id: UUID,
|
|
key_selection: list[int],
|
|
session_id: UUID
|
|
) -> list[int]:
|
|
assert (customer_id in self.customers.keys())
|
|
customer = self.customers[customer_id]
|
|
assert (username not in customer.users.keys())
|
|
assert (session_id in self.signup_sessions.keys())
|
|
self.signup_sessions[session_id].set_user_nkode(username, key_selection)
|
|
return self.signup_sessions[session_id].confirm_interface
|
|
|
|
def confirm_nkode(
|
|
self,
|
|
username: str,
|
|
customer_id: UUID,
|
|
confirm_key_entry: list[int],
|
|
session_id: UUID
|
|
) -> bool:
|
|
assert (
|
|
session_id in self.signup_sessions.keys() and
|
|
customer_id == self.signup_sessions[session_id].customer_id and
|
|
username == self.signup_sessions[session_id].username
|
|
)
|
|
customer = self.customers[customer_id]
|
|
|
|
passcode = self.signup_sessions[session_id].deduce_passcode(confirm_key_entry)
|
|
new_user_keys = UserCipherKeys.new(
|
|
customer.attributes.keypad_size,
|
|
customer.attributes.set_vals,
|
|
customer.nkode_policy.max_nkode_len
|
|
)
|
|
|
|
enciphered_passcode = new_user_keys.encipher_nkode(passcode, customer.attributes)
|
|
new_user = User(
|
|
username=username,
|
|
enciphered_passcode=enciphered_passcode,
|
|
user_keys=new_user_keys,
|
|
user_interface=self.signup_sessions[session_id].login_interface,
|
|
)
|
|
self.customers[customer_id].add_new_user(new_user)
|
|
del self.signup_sessions[session_id]
|
|
return True
|
|
|
|
def get_login_interface(self, username: str, customer_id: UUID) -> list[int]:
|
|
"""
|
|
TODO: how do we prevent a targeted denial-of-service attack?
|
|
"""
|
|
assert (customer_id in self.customers.keys())
|
|
customer = self.customers[customer_id]
|
|
assert (username in customer.users.keys())
|
|
user = customer.users[username]
|
|
user.user_interface.partial_interface_shuffle()
|
|
return user.user_interface.interface
|
|
|
|
def login(self, customer_id: UUID, username: str, key_selection: list[int]) -> bool:
|
|
assert (customer_id in self.customers.keys())
|
|
customer = self.customers[customer_id]
|
|
return customer.valid_key_entry(username, key_selection)
|
|
|
|
def renew_attributes(self, customer_id: UUID) -> bool:
|
|
assert (customer_id in self.customers.keys())
|
|
return self.customers[customer_id].renew_keys()
|