formatting
This commit is contained in:
@@ -1,20 +1,18 @@
|
||||
/*
|
||||
* Copyright 2014 David Horscroft
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*
|
||||
* The NoByteSetSphere stores user-to-user influences and their encryption
|
||||
* keys in an accessible manner.
|
||||
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except
|
||||
* in compliance with the License. You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software distributed under the License
|
||||
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
|
||||
* or implied. See the License for the specific language governing permissions and limitations under
|
||||
* the License.
|
||||
*
|
||||
* The NoByteSetSphere stores user-to-user influences and their encryption keys in an accessible
|
||||
* manner.
|
||||
*/
|
||||
|
||||
package nodash.core.spheres;
|
||||
@@ -27,31 +25,32 @@ import nodash.models.NoByteSet;
|
||||
import nodash.models.NoUser;
|
||||
|
||||
public final class NoByteSetSphere {
|
||||
private static final ArrayList<NoByteSet> EMPTY_BYTESET_LIST = new ArrayList<NoByteSet>(0);
|
||||
|
||||
private static ConcurrentHashMap<PublicKey, ArrayList<NoByteSet>> byteSets = new ConcurrentHashMap<PublicKey, ArrayList<NoByteSet>>();
|
||||
|
||||
public static void add(NoByteSet byteSet, PublicKey publicKey) {
|
||||
if (!NoByteSetSphere.byteSets.containsKey(publicKey)) {
|
||||
NoByteSetSphere.byteSets.put(publicKey, new ArrayList<NoByteSet>());
|
||||
}
|
||||
NoByteSetSphere.byteSets.get(publicKey).add(byteSet);
|
||||
}
|
||||
|
||||
public static void addList(ArrayList<NoByteSet> byteSetList, PublicKey publicKey) {
|
||||
if (!NoByteSetSphere.byteSets.containsKey(publicKey)) {
|
||||
NoByteSetSphere.byteSets.put(publicKey, new ArrayList<NoByteSet>());
|
||||
}
|
||||
NoByteSetSphere.byteSets.get(publicKey).addAll(byteSetList);
|
||||
}
|
||||
|
||||
public static ArrayList<NoByteSet> consume(NoUser user) {
|
||||
if (NoByteSetSphere.byteSets.containsKey(user.getRSAPublicKey())) {
|
||||
ArrayList<NoByteSet> result = NoByteSetSphere.byteSets.get(user.getRSAPublicKey());
|
||||
NoByteSetSphere.byteSets.remove(user.getRSAPublicKey());
|
||||
return result;
|
||||
} else {
|
||||
return NoByteSetSphere.EMPTY_BYTESET_LIST;
|
||||
}
|
||||
}
|
||||
private static final ArrayList<NoByteSet> EMPTY_BYTESET_LIST = new ArrayList<NoByteSet>(0);
|
||||
|
||||
private static ConcurrentHashMap<PublicKey, ArrayList<NoByteSet>> byteSets =
|
||||
new ConcurrentHashMap<PublicKey, ArrayList<NoByteSet>>();
|
||||
|
||||
public static void add(NoByteSet byteSet, PublicKey publicKey) {
|
||||
if (!NoByteSetSphere.byteSets.containsKey(publicKey)) {
|
||||
NoByteSetSphere.byteSets.put(publicKey, new ArrayList<NoByteSet>());
|
||||
}
|
||||
NoByteSetSphere.byteSets.get(publicKey).add(byteSet);
|
||||
}
|
||||
|
||||
public static void addList(ArrayList<NoByteSet> byteSetList, PublicKey publicKey) {
|
||||
if (!NoByteSetSphere.byteSets.containsKey(publicKey)) {
|
||||
NoByteSetSphere.byteSets.put(publicKey, new ArrayList<NoByteSet>());
|
||||
}
|
||||
NoByteSetSphere.byteSets.get(publicKey).addAll(byteSetList);
|
||||
}
|
||||
|
||||
public static ArrayList<NoByteSet> consume(NoUser user) {
|
||||
if (NoByteSetSphere.byteSets.containsKey(user.getRSAPublicKey())) {
|
||||
ArrayList<NoByteSet> result = NoByteSetSphere.byteSets.get(user.getRSAPublicKey());
|
||||
NoByteSetSphere.byteSets.remove(user.getRSAPublicKey());
|
||||
return result;
|
||||
} else {
|
||||
return NoByteSetSphere.EMPTY_BYTESET_LIST;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1,17 +1,15 @@
|
||||
/*
|
||||
* Copyright 2014 David Horscroft
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except
|
||||
* in compliance with the License. You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software distributed under the License
|
||||
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
|
||||
* or implied. See the License for the specific language governing permissions and limitations under
|
||||
* the License.
|
||||
*
|
||||
* The NoHashSpehre stores database hashes for user verification.
|
||||
*
|
||||
@@ -38,77 +36,78 @@ import nodash.exceptions.NoDashFatalException;
|
||||
import nodash.models.NoUser;
|
||||
|
||||
public final class NoHashSphereDefault implements NoHashSphereInterface {
|
||||
private Set<String> database = Collections.newSetFromMap(new ConcurrentHashMap<String, Boolean>());
|
||||
private String fileName;
|
||||
private boolean ready = false;
|
||||
|
||||
public NoHashSphereDefault(String fileName) {
|
||||
this.fileName = fileName;
|
||||
}
|
||||
|
||||
public NoHashSphereDefault() {
|
||||
this.fileName = ( (NoConfigDefault) NoCore.config).getDatabaseName();
|
||||
}
|
||||
|
||||
@SuppressWarnings("unchecked")
|
||||
public void setup() {
|
||||
if (NoCore.config.saveDatabase()) {
|
||||
File file = new File(this.fileName);
|
||||
if (file.exists()) {
|
||||
try {
|
||||
byte[] data = Files.readAllBytes(file.toPath());
|
||||
ByteArrayInputStream bais = new ByteArrayInputStream(data);
|
||||
ObjectInputStream ois = new ObjectInputStream(bais);
|
||||
this.database = (Set<String>) ois.readObject();
|
||||
ois.close();
|
||||
bais.close();
|
||||
} catch (IOException e){
|
||||
throw new NoDashFatalException("Unable to load up given database file.", e);
|
||||
} catch (ClassNotFoundException e) {
|
||||
throw new NoDashFatalException("Database file not in a verifiable format.", e);
|
||||
}
|
||||
}
|
||||
}
|
||||
this.ready = true;
|
||||
}
|
||||
|
||||
public synchronized void saveToFile() throws IOException {
|
||||
ByteArrayOutputStream baos = new ByteArrayOutputStream();
|
||||
ObjectOutputStream oos = new ObjectOutputStream(baos);
|
||||
oos.writeObject(this.database);
|
||||
byte[] data = baos.toByteArray();
|
||||
oos.close();
|
||||
baos.close();
|
||||
File file = new File( ( (NoConfigDefault) NoCore.config).getDatabaseName());
|
||||
Files.write(file.toPath(), data, StandardOpenOption.CREATE);
|
||||
}
|
||||
|
||||
public synchronized void addNewNoUser(NoUser user) throws IOException {
|
||||
String hash = user.createHashString();
|
||||
this.database.add(hash);
|
||||
this.saveToFile();
|
||||
}
|
||||
|
||||
public synchronized void insertHash(String hash) throws IOException {
|
||||
this.database.add(hash);
|
||||
this.saveToFile();
|
||||
}
|
||||
|
||||
public synchronized void removeHash(String hash) throws IOException {
|
||||
this.database.remove(hash);
|
||||
this.saveToFile();
|
||||
}
|
||||
|
||||
public synchronized boolean checkHash(String hash) {
|
||||
return this.database.contains(hash);
|
||||
}
|
||||
private Set<String> database = Collections
|
||||
.newSetFromMap(new ConcurrentHashMap<String, Boolean>());
|
||||
private String fileName;
|
||||
private boolean ready = false;
|
||||
|
||||
public synchronized long size() {
|
||||
return this.database.size();
|
||||
}
|
||||
public NoHashSphereDefault(String fileName) {
|
||||
this.fileName = fileName;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean isReady() {
|
||||
return this.ready;
|
||||
}
|
||||
public NoHashSphereDefault() {
|
||||
this.fileName = ((NoConfigDefault) NoCore.config).getDatabaseName();
|
||||
}
|
||||
|
||||
@SuppressWarnings("unchecked")
|
||||
public void setup() {
|
||||
if (NoCore.config.saveDatabase()) {
|
||||
File file = new File(this.fileName);
|
||||
if (file.exists()) {
|
||||
try {
|
||||
byte[] data = Files.readAllBytes(file.toPath());
|
||||
ByteArrayInputStream bais = new ByteArrayInputStream(data);
|
||||
ObjectInputStream ois = new ObjectInputStream(bais);
|
||||
this.database = (Set<String>) ois.readObject();
|
||||
ois.close();
|
||||
bais.close();
|
||||
} catch (IOException e) {
|
||||
throw new NoDashFatalException("Unable to load up given database file.", e);
|
||||
} catch (ClassNotFoundException e) {
|
||||
throw new NoDashFatalException("Database file not in a verifiable format.", e);
|
||||
}
|
||||
}
|
||||
}
|
||||
this.ready = true;
|
||||
}
|
||||
|
||||
public synchronized void saveToFile() throws IOException {
|
||||
ByteArrayOutputStream baos = new ByteArrayOutputStream();
|
||||
ObjectOutputStream oos = new ObjectOutputStream(baos);
|
||||
oos.writeObject(this.database);
|
||||
byte[] data = baos.toByteArray();
|
||||
oos.close();
|
||||
baos.close();
|
||||
File file = new File(((NoConfigDefault) NoCore.config).getDatabaseName());
|
||||
Files.write(file.toPath(), data, StandardOpenOption.CREATE);
|
||||
}
|
||||
|
||||
public synchronized void addNewNoUser(NoUser user) throws IOException {
|
||||
String hash = user.createHashString();
|
||||
this.database.add(hash);
|
||||
this.saveToFile();
|
||||
}
|
||||
|
||||
public synchronized void insertHash(String hash) throws IOException {
|
||||
this.database.add(hash);
|
||||
this.saveToFile();
|
||||
}
|
||||
|
||||
public synchronized void removeHash(String hash) throws IOException {
|
||||
this.database.remove(hash);
|
||||
this.saveToFile();
|
||||
}
|
||||
|
||||
public synchronized boolean checkHash(String hash) {
|
||||
return this.database.contains(hash);
|
||||
}
|
||||
|
||||
public synchronized long size() {
|
||||
return this.database.size();
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean isReady() {
|
||||
return this.ready;
|
||||
}
|
||||
}
|
||||
|
||||
@@ -5,12 +5,19 @@ import java.io.IOException;
|
||||
import nodash.models.NoUser;
|
||||
|
||||
public interface NoHashSphereInterface {
|
||||
public void setup();
|
||||
public void saveToFile() throws IOException;
|
||||
public void addNewNoUser(NoUser user) throws IOException;
|
||||
public void insertHash(String hash) throws IOException;
|
||||
public void removeHash(String hash) throws IOException;
|
||||
public boolean checkHash(String hash);
|
||||
public long size();
|
||||
public boolean isReady();
|
||||
public void setup();
|
||||
|
||||
public void saveToFile() throws IOException;
|
||||
|
||||
public void addNewNoUser(NoUser user) throws IOException;
|
||||
|
||||
public void insertHash(String hash) throws IOException;
|
||||
|
||||
public void removeHash(String hash) throws IOException;
|
||||
|
||||
public boolean checkHash(String hash);
|
||||
|
||||
public long size();
|
||||
|
||||
public boolean isReady();
|
||||
}
|
||||
|
||||
@@ -1,20 +1,18 @@
|
||||
/*
|
||||
* Copyright 2014 David Horscroft
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*
|
||||
* The NoSessionSphere stores user sessions and allows their access and
|
||||
* manipulation with the use of their UUID.
|
||||
* Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except
|
||||
* in compliance with the License. You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software distributed under the License
|
||||
* is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
|
||||
* or implied. See the License for the specific language governing permissions and limitations under
|
||||
* the License.
|
||||
*
|
||||
* The NoSessionSphere stores user sessions and allows their access and manipulation with the use of
|
||||
* their UUID.
|
||||
*/
|
||||
|
||||
package nodash.core.spheres;
|
||||
@@ -43,148 +41,161 @@ import nodash.models.NoUser;
|
||||
import nodash.models.NoSession.NoState;
|
||||
|
||||
public final class NoSessionSphere {
|
||||
private static ConcurrentHashMap<UUID, NoSession> sessions = new ConcurrentHashMap<UUID, NoSession>();
|
||||
private static Set<String> originalHashesOnline = Collections.newSetFromMap(new ConcurrentHashMap<String, Boolean>());
|
||||
|
||||
public static synchronized void prune() {
|
||||
for (UUID uuid : NoSessionSphere.sessions.keySet()) {
|
||||
pruneSingle(uuid);
|
||||
}
|
||||
}
|
||||
private static ConcurrentHashMap<UUID, NoSession> sessions =
|
||||
new ConcurrentHashMap<UUID, NoSession>();
|
||||
private static Set<String> originalHashesOnline = Collections
|
||||
.newSetFromMap(new ConcurrentHashMap<String, Boolean>());
|
||||
|
||||
public static void shred(byte[] encryptedUUID) {
|
||||
try {
|
||||
UUID uuid = NoSession.decryptUUID(encryptedUUID);
|
||||
if (NoSessionSphere.sessions.containsKey(uuid)) {
|
||||
NoSession session = NoSessionSphere.sessions.get(uuid);
|
||||
NoByteSetSphere.addList(session.incoming, session.current.getRSAPublicKey());
|
||||
NoSessionSphere.originalHashesOnline.remove(Base64.encodeBase64String(session.getOriginalHash()));
|
||||
NoSessionSphere.sessions.remove(uuid);
|
||||
session = null;
|
||||
}
|
||||
} catch (NoDashSessionBadUUIDException e) {
|
||||
// Suppress, doesn't matter
|
||||
}
|
||||
}
|
||||
|
||||
public static synchronized void pruneSingle(UUID uuid) {
|
||||
NoSession session = NoSessionSphere.sessions.get(uuid);
|
||||
try {
|
||||
session.check();
|
||||
} catch (NoSessionExpiredException e) {
|
||||
/* Resultant from 3.1 and 3.2 */
|
||||
NoByteSetSphere.addList(session.incoming, session.current.getRSAPublicKey());
|
||||
NoSessionSphere.originalHashesOnline.remove(session.getOriginalHash());
|
||||
NoSessionSphere.sessions.remove(uuid);
|
||||
session = null;
|
||||
} catch (NoSessionConfirmedException e) {
|
||||
/* Should be cleaned up at 5.2 */
|
||||
}
|
||||
}
|
||||
|
||||
public static synchronized byte[] login(byte[] data, char[] password) throws NoUserNotValidException, NoUserAlreadyOnlineException, NoSessionExpiredException {
|
||||
/* 1. Login with byte[] data and byte[] password */
|
||||
NoSession session = new NoSession(data, password);
|
||||
/* 1.1. User currently has an online session, must wait for it to expire. */
|
||||
if (originalHashesOnline.contains(Base64.encodeBase64String(session.getOriginalHash()))) {
|
||||
throw new NoUserAlreadyOnlineException();
|
||||
}
|
||||
/* 1.2. User successfully logged in: set up session records. */
|
||||
NoSessionSphere.originalHashesOnline.add(Base64.encodeBase64String(session.getOriginalHash()));
|
||||
NoSessionSphere.sessions.put(session.uuid, session);
|
||||
|
||||
/* 2. Check NoByteSetSphere for incoming Influences */
|
||||
session.incoming = NoByteSetSphere.consume(session.current);
|
||||
for (NoByteSet nbs : session.incoming) {
|
||||
/* 2.1 Decrypt NoInfluence from NoByteSet, let the current user consume them */
|
||||
try {
|
||||
session.consume(nbs);
|
||||
} catch (NoByteSetBadDecryptionException e) {
|
||||
throw new NoDashFatalException("Bad byte sets on consumption.", e);
|
||||
}
|
||||
} /* 2.2 Alternatively, no NoByteSets to consume */
|
||||
|
||||
try {
|
||||
session.check();
|
||||
} catch (NoSessionConfirmedException e) {
|
||||
/* Should be impossible to reach */
|
||||
throw new NoDashFatalException(e);
|
||||
}
|
||||
|
||||
/* Will set to 2.1[MODIFIED] or 2.2[IDLE] */
|
||||
|
||||
/* Precursor to 3.; allow website to associate user session with a cookie. */
|
||||
return session.getEncryptedUUID();
|
||||
}
|
||||
|
||||
public static NoUser getUser(byte[] encryptedUUID) throws NoDashSessionBadUUIDException, NoSessionExpiredException, NoSessionConfirmedException {
|
||||
UUID uuid = NoSession.decryptUUID(encryptedUUID);
|
||||
if (NoSessionSphere.sessions.containsKey(uuid)) {
|
||||
NoSessionSphere.pruneSingle(uuid);
|
||||
try {
|
||||
return NoSessionSphere.sessions.get(uuid).getNoUser();
|
||||
} catch (NullPointerException e) {
|
||||
throw new NoSessionExpiredException();
|
||||
}
|
||||
}
|
||||
throw new NoSessionExpiredException();
|
||||
}
|
||||
|
||||
public static NoState getState(byte[] encryptedUUID) throws NoDashSessionBadUUIDException, NoSessionExpiredException, NoSessionConfirmedException {
|
||||
UUID uuid = NoSession.decryptUUID(encryptedUUID);
|
||||
if (NoSessionSphere.sessions.containsKey(uuid)) {
|
||||
NoSessionSphere.pruneSingle(uuid);
|
||||
NoSession session = NoSessionSphere.sessions.get(uuid);
|
||||
return session.getNoState();
|
||||
}
|
||||
throw new NoSessionExpiredException();
|
||||
}
|
||||
|
||||
public static synchronized byte[] save(byte[] encryptedUUID, char[] password) throws NoDashSessionBadUUIDException, NoSessionExpiredException, NoSessionConfirmedException, NoSessionNotChangedException, NoSessionAlreadyAwaitingConfirmationException {
|
||||
UUID uuid = NoSession.decryptUUID(encryptedUUID);
|
||||
if (NoSessionSphere.sessions.containsKey(uuid)) {
|
||||
NoSessionSphere.pruneSingle(uuid);
|
||||
NoSession session = NoSessionSphere.sessions.get(uuid);
|
||||
|
||||
if (session.getNoState().equals(NoState.IDLE)) {
|
||||
throw new NoSessionNotChangedException();
|
||||
} else if (session.getNoState().equals(NoState.AWAITING_CONFIRMATION)) {
|
||||
throw new NoSessionAlreadyAwaitingConfirmationException();
|
||||
}
|
||||
return session.initiateSaveAttempt(password);
|
||||
}
|
||||
throw new NoSessionExpiredException();
|
||||
}
|
||||
|
||||
public static synchronized void confirm(byte[] encryptedUUID, char[] password, byte[] data) throws NoDashSessionBadUUIDException, NoSessionExpiredException, NoSessionConfirmedException, NoSessionNotAwaitingConfirmationException, NoUserNotValidException {
|
||||
UUID uuid = NoSession.decryptUUID(encryptedUUID);
|
||||
if (NoSessionSphere.sessions.containsKey(uuid)) {
|
||||
NoSessionSphere.pruneSingle(uuid);
|
||||
NoSession session = NoSessionSphere.sessions.get(uuid);
|
||||
session.confirmSave(data, password);
|
||||
return;
|
||||
}
|
||||
throw new NoSessionExpiredException();
|
||||
}
|
||||
public static synchronized void prune() {
|
||||
for (UUID uuid : NoSessionSphere.sessions.keySet()) {
|
||||
pruneSingle(uuid);
|
||||
}
|
||||
}
|
||||
|
||||
public static synchronized NoRegister registerUser(NoUser user, char[] password) {
|
||||
NoRegister result = new NoRegister();
|
||||
NoSession session = new NoSession(user);
|
||||
NoSessionSphere.sessions.put(session.uuid, session);
|
||||
result.cookie = session.getEncryptedUUID();
|
||||
try {
|
||||
result.data = NoSessionSphere.save(result.cookie, password);
|
||||
} catch (NoDashSessionBadUUIDException e) {
|
||||
throw new NoDashFatalException("Immediately generated cookie throwing bad cookie error.", e);
|
||||
} catch (NoSessionExpiredException e) {
|
||||
throw new NoDashFatalException("Session expired before it was even returned to client.", e);
|
||||
} catch (NoSessionConfirmedException e) {
|
||||
throw new NoDashFatalException("Session is in confirmed state before it was returned to client.", e);
|
||||
} catch (NoSessionNotChangedException e) {
|
||||
throw new NoDashFatalException("Session claims to be unchanged but user is newly registered.", e);
|
||||
} catch (NoSessionAlreadyAwaitingConfirmationException e) {
|
||||
throw new NoDashFatalException("Session claims to be awaiting confirmation before returning data to the user.", e);
|
||||
}
|
||||
return result;
|
||||
}
|
||||
}
|
||||
public static void shred(byte[] encryptedUUID) {
|
||||
try {
|
||||
UUID uuid = NoSession.decryptUUID(encryptedUUID);
|
||||
if (NoSessionSphere.sessions.containsKey(uuid)) {
|
||||
NoSession session = NoSessionSphere.sessions.get(uuid);
|
||||
NoByteSetSphere.addList(session.incoming, session.current.getRSAPublicKey());
|
||||
NoSessionSphere.originalHashesOnline.remove(Base64.encodeBase64String(session
|
||||
.getOriginalHash()));
|
||||
NoSessionSphere.sessions.remove(uuid);
|
||||
session = null;
|
||||
}
|
||||
} catch (NoDashSessionBadUUIDException e) {
|
||||
// Suppress, doesn't matter
|
||||
}
|
||||
}
|
||||
|
||||
public static synchronized void pruneSingle(UUID uuid) {
|
||||
NoSession session = NoSessionSphere.sessions.get(uuid);
|
||||
try {
|
||||
session.check();
|
||||
} catch (NoSessionExpiredException e) {
|
||||
/* Resultant from 3.1 and 3.2 */
|
||||
NoByteSetSphere.addList(session.incoming, session.current.getRSAPublicKey());
|
||||
NoSessionSphere.originalHashesOnline.remove(session.getOriginalHash());
|
||||
NoSessionSphere.sessions.remove(uuid);
|
||||
session = null;
|
||||
} catch (NoSessionConfirmedException e) {
|
||||
/* Should be cleaned up at 5.2 */
|
||||
}
|
||||
}
|
||||
|
||||
public static synchronized byte[] login(byte[] data, char[] password)
|
||||
throws NoUserNotValidException, NoUserAlreadyOnlineException, NoSessionExpiredException {
|
||||
/* 1. Login with byte[] data and byte[] password */
|
||||
NoSession session = new NoSession(data, password);
|
||||
/* 1.1. User currently has an online session, must wait for it to expire. */
|
||||
if (originalHashesOnline.contains(Base64.encodeBase64String(session.getOriginalHash()))) {
|
||||
throw new NoUserAlreadyOnlineException();
|
||||
}
|
||||
/* 1.2. User successfully logged in: set up session records. */
|
||||
NoSessionSphere.originalHashesOnline.add(Base64.encodeBase64String(session.getOriginalHash()));
|
||||
NoSessionSphere.sessions.put(session.uuid, session);
|
||||
|
||||
/* 2. Check NoByteSetSphere for incoming Influences */
|
||||
session.incoming = NoByteSetSphere.consume(session.current);
|
||||
for (NoByteSet nbs : session.incoming) {
|
||||
/* 2.1 Decrypt NoInfluence from NoByteSet, let the current user consume them */
|
||||
try {
|
||||
session.consume(nbs);
|
||||
} catch (NoByteSetBadDecryptionException e) {
|
||||
throw new NoDashFatalException("Bad byte sets on consumption.", e);
|
||||
}
|
||||
} /* 2.2 Alternatively, no NoByteSets to consume */
|
||||
|
||||
try {
|
||||
session.check();
|
||||
} catch (NoSessionConfirmedException e) {
|
||||
/* Should be impossible to reach */
|
||||
throw new NoDashFatalException(e);
|
||||
}
|
||||
|
||||
/* Will set to 2.1[MODIFIED] or 2.2[IDLE] */
|
||||
|
||||
/* Precursor to 3.; allow website to associate user session with a cookie. */
|
||||
return session.getEncryptedUUID();
|
||||
}
|
||||
|
||||
public static NoUser getUser(byte[] encryptedUUID) throws NoDashSessionBadUUIDException,
|
||||
NoSessionExpiredException, NoSessionConfirmedException {
|
||||
UUID uuid = NoSession.decryptUUID(encryptedUUID);
|
||||
if (NoSessionSphere.sessions.containsKey(uuid)) {
|
||||
NoSessionSphere.pruneSingle(uuid);
|
||||
try {
|
||||
return NoSessionSphere.sessions.get(uuid).getNoUser();
|
||||
} catch (NullPointerException e) {
|
||||
throw new NoSessionExpiredException();
|
||||
}
|
||||
}
|
||||
throw new NoSessionExpiredException();
|
||||
}
|
||||
|
||||
public static NoState getState(byte[] encryptedUUID) throws NoDashSessionBadUUIDException,
|
||||
NoSessionExpiredException, NoSessionConfirmedException {
|
||||
UUID uuid = NoSession.decryptUUID(encryptedUUID);
|
||||
if (NoSessionSphere.sessions.containsKey(uuid)) {
|
||||
NoSessionSphere.pruneSingle(uuid);
|
||||
NoSession session = NoSessionSphere.sessions.get(uuid);
|
||||
return session.getNoState();
|
||||
}
|
||||
throw new NoSessionExpiredException();
|
||||
}
|
||||
|
||||
public static synchronized byte[] save(byte[] encryptedUUID, char[] password)
|
||||
throws NoDashSessionBadUUIDException, NoSessionExpiredException, NoSessionConfirmedException,
|
||||
NoSessionNotChangedException, NoSessionAlreadyAwaitingConfirmationException {
|
||||
UUID uuid = NoSession.decryptUUID(encryptedUUID);
|
||||
if (NoSessionSphere.sessions.containsKey(uuid)) {
|
||||
NoSessionSphere.pruneSingle(uuid);
|
||||
NoSession session = NoSessionSphere.sessions.get(uuid);
|
||||
|
||||
if (session.getNoState().equals(NoState.IDLE)) {
|
||||
throw new NoSessionNotChangedException();
|
||||
} else if (session.getNoState().equals(NoState.AWAITING_CONFIRMATION)) {
|
||||
throw new NoSessionAlreadyAwaitingConfirmationException();
|
||||
}
|
||||
return session.initiateSaveAttempt(password);
|
||||
}
|
||||
throw new NoSessionExpiredException();
|
||||
}
|
||||
|
||||
public static synchronized void confirm(byte[] encryptedUUID, char[] password, byte[] data)
|
||||
throws NoDashSessionBadUUIDException, NoSessionExpiredException, NoSessionConfirmedException,
|
||||
NoSessionNotAwaitingConfirmationException, NoUserNotValidException {
|
||||
UUID uuid = NoSession.decryptUUID(encryptedUUID);
|
||||
if (NoSessionSphere.sessions.containsKey(uuid)) {
|
||||
NoSessionSphere.pruneSingle(uuid);
|
||||
NoSession session = NoSessionSphere.sessions.get(uuid);
|
||||
session.confirmSave(data, password);
|
||||
return;
|
||||
}
|
||||
throw new NoSessionExpiredException();
|
||||
}
|
||||
|
||||
public static synchronized NoRegister registerUser(NoUser user, char[] password) {
|
||||
NoRegister result = new NoRegister();
|
||||
NoSession session = new NoSession(user);
|
||||
NoSessionSphere.sessions.put(session.uuid, session);
|
||||
result.cookie = session.getEncryptedUUID();
|
||||
try {
|
||||
result.data = NoSessionSphere.save(result.cookie, password);
|
||||
} catch (NoDashSessionBadUUIDException e) {
|
||||
throw new NoDashFatalException("Immediately generated cookie throwing bad cookie error.", e);
|
||||
} catch (NoSessionExpiredException e) {
|
||||
throw new NoDashFatalException("Session expired before it was even returned to client.", e);
|
||||
} catch (NoSessionConfirmedException e) {
|
||||
throw new NoDashFatalException(
|
||||
"Session is in confirmed state before it was returned to client.", e);
|
||||
} catch (NoSessionNotChangedException e) {
|
||||
throw new NoDashFatalException(
|
||||
"Session claims to be unchanged but user is newly registered.", e);
|
||||
} catch (NoSessionAlreadyAwaitingConfirmationException e) {
|
||||
throw new NoDashFatalException(
|
||||
"Session claims to be awaiting confirmation before returning data to the user.", e);
|
||||
}
|
||||
return result;
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user