use std::time::Duration;
use base64::{engine::general_purpose, Engine as _};
use jsonwebtoken::{decode, encode, Algorithm, DecodingKey, EncodingKey, Header, Validation};
use crate::{Error, Jwt};
const AUDIENCE: &str = "redap";
#[derive(Clone, PartialEq, Eq)]
#[repr(transparent)]
pub struct RedapProvider {
secret_key: Vec<u8>,
}
impl std::fmt::Debug for RedapProvider {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
f.debug_struct("RedapProvider")
.field("secret_key", &"********")
.finish()
}
}
#[derive(Debug, serde::Serialize, serde::Deserialize)]
pub struct Claims {
pub iss: String,
pub sub: String,
pub aud: String,
pub exp: u64,
pub iat: u64,
}
#[derive(Debug, Clone)]
pub struct VerificationOptions {
leeway: Option<Duration>,
}
impl VerificationOptions {
#[inline]
pub fn with_leeway(mut self, leeway: Option<Duration>) -> Self {
self.leeway = leeway;
self
}
#[inline]
pub fn without_leeway(mut self) -> Self {
self.leeway = None;
self
}
}
impl Default for VerificationOptions {
fn default() -> Self {
Self {
leeway: Some(Duration::from_secs(5 * 60)),
}
}
}
impl From<VerificationOptions> for Validation {
fn from(options: VerificationOptions) -> Self {
let mut validation = Self::new(Algorithm::HS256);
validation.set_audience(&[AUDIENCE.to_owned()]);
validation.set_required_spec_claims(&["exp", "sub", "aud", "iss"]);
validation.leeway = options.leeway.map_or(0, |leeway| leeway.as_secs());
validation
}
}
fn generate_secret_key(mut rng: impl rand::Rng, length: usize) -> Vec<u8> {
(0..length).map(|_| rng.gen::<u8>()).collect()
}
impl RedapProvider {
pub fn generate(rng: impl rand::Rng) -> Self {
let secret_key = generate_secret_key(rng, 32);
debug_assert_eq!(
secret_key.len() * size_of::<u8>() * 8,
256,
"The resulting secret should be 256 bits."
);
Self { secret_key }
}
pub fn from_base64(base64: impl AsRef<str>) -> Result<Self, Error> {
let secret_key = general_purpose::STANDARD.decode(base64.as_ref())?;
Ok(Self { secret_key })
}
pub fn to_base64(&self) -> String {
general_purpose::STANDARD.encode(&self.secret_key)
}
pub fn token(
&self,
duration: Duration,
issuer: impl Into<String>,
subject: impl Into<String>,
) -> Result<Jwt, Error> {
let now = std::time::SystemTime::now().duration_since(std::time::UNIX_EPOCH)?;
let claims = Claims {
iss: issuer.into(),
sub: subject.into(),
aud: AUDIENCE.to_owned(),
exp: (now + duration).as_secs(),
iat: now.as_secs(),
};
let token = encode(
&Header::default(),
&claims,
&EncodingKey::from_secret(&self.secret_key),
)?;
Ok(Jwt(token))
}
pub fn verify(&self, token: &Jwt, options: VerificationOptions) -> Result<Claims, Error> {
let validation = options.into();
let token_data = decode::<Claims>(
&token.0,
&DecodingKey::from_secret(&self.secret_key),
&validation,
)?;
Ok(token_data.claims)
}
}