token.rs 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118
  1. //! Lock Token module
  2. use borsh::{BorshDeserialize, BorshSerialize};
  3. use chrono::{DateTime, Duration, Utc};
  4. use hmac::{Hmac, Mac};
  5. use rand::Rng;
  6. use serde::{Deserialize, Serialize};
  7. use sha2::Sha256;
  8. use std::ops::Deref;
  9. type HmacSha256 = Hmac<Sha256>;
  10. crate::BinaryId!(TokenPayload, "token");
  11. crate::BinaryId!(TokenSignature, "sig");
  12. #[derive(thiserror::Error, Debug, Serialize)]
  13. /// Error type
  14. pub enum Error {
  15. /// Missing update token
  16. #[error("Missing update token")]
  17. MissingUpdateToken,
  18. /// Invalid signature
  19. #[error("Invalid signature")]
  20. InvalidSignature,
  21. /// I/O error
  22. #[error("IO error: {0}")]
  23. #[serde(serialize_with = "crate::serialize_error_to_string")]
  24. IO(#[from] std::io::Error),
  25. }
  26. #[derive(Debug)]
  27. /// Lock Token Manager
  28. pub struct TokenManager(pub Vec<u8>);
  29. impl Default for TokenManager {
  30. fn default() -> Self {
  31. let mut rng = rand::thread_rng();
  32. let mut payload = [0u8; 10];
  33. rng.fill(&mut payload);
  34. Self(payload.to_vec())
  35. }
  36. }
  37. impl TokenManager {
  38. /// Checks if the given token is valid and still not expired
  39. pub fn verify(&self, token: Token, update_token: &Option<TokenPayload>) -> Result<(), Error> {
  40. if !token.is_valid() {
  41. return Ok(());
  42. }
  43. let update_token = if let Some(update_token) = update_token {
  44. update_token
  45. } else {
  46. return Err(Error::MissingUpdateToken);
  47. };
  48. let mut mac = HmacSha256::new_from_slice(&self.0).expect("HMAC can take key of any size");
  49. mac.update(update_token.deref());
  50. let result = mac.finalize().into_bytes();
  51. if &result[..] != *token.signature {
  52. Err(Error::InvalidSignature)
  53. } else {
  54. Ok(())
  55. }
  56. }
  57. /// Creates a new instance of the token
  58. pub fn new_token(&self, owner: String, duration: Duration) -> (Token, TokenPayload) {
  59. let mut rng = rand::thread_rng();
  60. let mut payload = [0u8; 32];
  61. rng.fill(&mut payload);
  62. let mut mac = HmacSha256::new_from_slice(&self.0).expect("HMAC can take key of any size");
  63. mac.update(&payload);
  64. let signature: [u8; 32] = mac.finalize().into_bytes().into();
  65. (
  66. // The token cannot be altered once it is commited, as the revision ID is the hash of
  67. // the entire content, therefore it is safer to only HMAC the
  68. Token {
  69. expires_at: Utc::now() + duration,
  70. owner,
  71. signature: signature.into(),
  72. },
  73. payload.into(),
  74. )
  75. }
  76. }
  77. #[derive(Serialize, Deserialize, BorshSerialize, BorshDeserialize, Clone, Debug, PartialEq)]
  78. /// Inner token
  79. ///
  80. /// This token has the transaction ID, the expiration date and the owner string. This is the data to
  81. /// be signed by the HMAC and sent to the client.
  82. pub struct Token {
  83. #[borsh(
  84. serialize_with = "crate::to_ts_microseconds",
  85. deserialize_with = "crate::from_ts_microseconds"
  86. )]
  87. expires_at: DateTime<Utc>,
  88. signature: TokenSignature,
  89. owner: String,
  90. }
  91. impl Token {
  92. /// Converts the token to bytes
  93. pub fn to_bytes(&self) -> Result<Vec<u8>, Error> {
  94. Ok(borsh::to_vec(&self)?)
  95. }
  96. /// Checks if the token is valid
  97. pub fn is_valid(&self) -> bool {
  98. self.expires_at > Utc::now()
  99. }
  100. }