ncantu 6bf37be44e Cron restart services (bitcoind, mempool), service-login-verify, website-skeleton, docs
**Motivations:**
- Consigner l'état actuel du dépôt (cron, service-login-verify, website-skeleton, userwallet, docs).
- Centraliser les modifications en attente.

**Root causes:**
- N/A (commit groupé).

**Correctifs:**
- N/A.

**Evolutions:**
- Cron quotidien restart services : script local sans SSH, systemd (bitcoin-signet, bitcoin, APIs, dashboard, userwallet, website-skeleton) + Docker (mempool, bitcoin-signet-instance).
- Feature cron-restart-services-local : documentation et règle scripts locaux / pas d'SSH.
- service-login-verify : module vérification login (buildAllowedPubkeys, verifyLoginProof, nonceCache).
- website-skeleton : app iframe UserWallet, config, systemd unit.
- userwallet : collectSignatures, relay.
- docs : DOMAINS_AND_PORTS, README, WEBSITE_SKELETON ; features userwallet-contrat-login, timeouts-backoff, service-login-verify.

**Pages affectées:**
- data/restart-services-cron.sh, data/restart-services.log, data/sync-utxos.log
- features/cron-restart-services-local.md, features/service-login-verify.md, features/userwallet-contrat-login-reste-a-faire.md, features/userwallet-timeouts-backoff.md
- docs/DOMAINS_AND_PORTS.md, docs/README.md, docs/WEBSITE_SKELETON.md
- configure-nginx-proxy.sh
- service-login-verify/ (src, dist, node_modules)
- userwallet/src/utils/collectSignatures.ts, userwallet/src/utils/relay.ts
- website-skeleton/
2026-01-28 00:48:37 +01:00

66 lines
2.0 KiB
JavaScript

import { verifySignature } from './crypto.js';
const DEFAULT_TIMESTAMP_WINDOW_MS = 300000;
function verifyTimestamp(timestamp, windowMs) {
const now = Date.now();
const diff = Math.abs(now - timestamp);
return diff <= windowMs;
}
function verifySignaturesStrict(hashValue, signatures, allowedPubkeys) {
let valid = 0;
let unauthorized = 0;
for (const s of signatures) {
const messageToVerify = `${hashValue}-${s.nonce}`;
const cryptoOk = verifySignature(messageToVerify, s.signature, s.cle_publique);
if (!cryptoOk) {
continue;
}
if (allowedPubkeys.has(s.cle_publique)) {
valid++;
}
else {
unauthorized++;
}
}
return { valid, unauthorized };
}
/**
* Verify login proof: crypto, allowed pubkeys, timestamp window, nonce anti-replay.
* Service must provide allowedPubkeys (from validators) and a NonceCache.
*/
export function verifyLoginProof(proof, ctx) {
if (ctx.allowedPubkeys.size === 0) {
return {
accept: false,
reason: 'validators_not_verifiable',
};
}
const windowMs = ctx.timestampWindowMs ?? DEFAULT_TIMESTAMP_WINDOW_MS;
if (!verifyTimestamp(proof.challenge.timestamp, windowMs)) {
return {
accept: false,
reason: 'timestamp_out_of_window',
};
}
if (!ctx.nonceCache.isValid(proof.challenge.nonce, proof.challenge.timestamp)) {
return {
accept: false,
reason: 'nonce_reused',
};
}
const hashValue = proof.challenge.hash;
const { valid, unauthorized } = verifySignaturesStrict(hashValue, proof.signatures, ctx.allowedPubkeys);
if (valid === 0) {
return {
accept: false,
reason: 'no_validator_signature',
};
}
if (unauthorized > 0) {
return {
accept: false,
reason: 'signature_cle_publique_not_authorized',
};
}
return { accept: true };
}