All checks were successful
Release Tagging / release (push) Successful in 39s
Rust Build / Check (push) Successful in 41s
Rust Build / Rustfmt (push) Successful in 36s
Rust Build / Test Suite (push) Successful in 37s
Rust Build / Clippy (push) Successful in 33s
Rust Build / build (push) Successful in 34s
Rust Build / Test Suite (pull_request) Successful in 31s
Rust Build / Check (pull_request) Successful in 33s
Rust Build / Clippy (pull_request) Successful in 31s
Rust Build / Rustfmt (pull_request) Successful in 32s
Rust Build / build (pull_request) Successful in 41s
Reviewed-on: #55 Co-authored-by: phoenix <kundeng00@pm.me> Co-committed-by: phoenix <kundeng00@pm.me>
202 lines
5.7 KiB
Rust
202 lines
5.7 KiB
Rust
use std::default::Default;
|
|
|
|
use serde::{Deserialize, Serialize};
|
|
|
|
#[derive(Clone, Debug, Deserialize, Serialize)]
|
|
pub struct Token {
|
|
pub scope: String,
|
|
pub expiration: i64,
|
|
pub audience: String,
|
|
pub issuer: String,
|
|
pub issued: i64,
|
|
}
|
|
|
|
#[derive(Clone, Debug, Deserialize, Serialize)]
|
|
pub struct AccessToken {
|
|
#[serde(alias = "init::is_uuid_nil")]
|
|
pub user_id: uuid::Uuid,
|
|
#[serde(alias = "username")]
|
|
pub username: String,
|
|
#[serde(alias = "token")]
|
|
pub token: String,
|
|
#[serde(alias = "token_type")]
|
|
pub token_type: String,
|
|
#[serde(alias = "expiration")]
|
|
pub expiration: i64,
|
|
#[serde(alias = "message")]
|
|
pub message: String,
|
|
}
|
|
|
|
impl Default for Token {
|
|
fn default() -> Self {
|
|
Token {
|
|
scope: String::new(),
|
|
expiration: -1,
|
|
audience: String::new(),
|
|
issuer: String::new(),
|
|
issued: -1,
|
|
}
|
|
}
|
|
}
|
|
|
|
impl AccessToken {
|
|
pub fn bearer_token(&self) -> String {
|
|
let mut token: String = String::from("Bearer ");
|
|
token += &self.token.clone();
|
|
token
|
|
}
|
|
}
|
|
|
|
impl Token {
|
|
pub fn _to_json(&self) -> Result<String, serde_json::Error> {
|
|
serde_json::to_string_pretty(&self)
|
|
}
|
|
|
|
// TODO: Implement
|
|
pub fn token_expired(&self) -> bool {
|
|
false
|
|
}
|
|
|
|
pub fn contains_scope(&self, des_scope: &String) -> bool {
|
|
self.scope.contains(des_scope)
|
|
}
|
|
}
|
|
|
|
pub fn get_issued() -> time::Result<time::OffsetDateTime> {
|
|
Ok(time::OffsetDateTime::now_utc())
|
|
}
|
|
|
|
mod util {
|
|
pub fn time_to_std_time(
|
|
provided_time: &time::OffsetDateTime,
|
|
) -> Result<std::time::SystemTime, std::time::SystemTimeError> {
|
|
let converted = std::time::SystemTime::from(*provided_time);
|
|
Ok(converted)
|
|
}
|
|
}
|
|
|
|
#[derive(Debug)]
|
|
pub struct TokenResource {
|
|
pub message: String,
|
|
pub issuer: String,
|
|
pub audiences: Vec<String>,
|
|
pub id: uuid::Uuid,
|
|
}
|
|
|
|
pub const TOKEN_TYPE: &str = "JWT";
|
|
|
|
pub fn create_token(
|
|
key: &String,
|
|
token_resource: &TokenResource,
|
|
duration: time::Duration,
|
|
) -> Result<(String, i64), josekit::JoseError> {
|
|
let mut header = josekit::jws::JwsHeader::new();
|
|
header.set_token_type(TOKEN_TYPE);
|
|
|
|
let mut payload = josekit::jwt::JwtPayload::new();
|
|
let message = &token_resource.message;
|
|
let issuer = &token_resource.issuer;
|
|
let audiences: &Vec<String> = &token_resource.audiences;
|
|
payload.set_subject(message);
|
|
payload.set_issuer(issuer);
|
|
payload.set_audience(audiences.clone());
|
|
if !token_resource.id.is_nil() {
|
|
match payload.set_claim("id", Some(serde_json::json!(token_resource.id))) {
|
|
Ok(_) => {}
|
|
Err(err) => {
|
|
return Err(err);
|
|
}
|
|
}
|
|
}
|
|
match get_issued() {
|
|
Ok(issued) => {
|
|
let expire = issued + duration;
|
|
payload.set_issued_at(&util::time_to_std_time(&issued).unwrap());
|
|
payload.set_expires_at(&util::time_to_std_time(&expire).unwrap());
|
|
|
|
let signer = josekit::jws::alg::hmac::HmacJwsAlgorithm::Hs256
|
|
.signer_from_bytes(key.as_bytes())
|
|
.unwrap();
|
|
Ok((
|
|
josekit::jwt::encode_with_signer(&payload, &header, &signer).unwrap(),
|
|
(expire - time::OffsetDateTime::UNIX_EPOCH).whole_seconds(),
|
|
))
|
|
}
|
|
Err(e) => Err(josekit::JoseError::InvalidClaim(e.into())),
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use super::*;
|
|
|
|
fn test_key() -> String {
|
|
String::from("c3092urmc2219ix320i40m293ic29IM09IN0u879Y8B98YB8yb86TN7B55R4yv4RCVU6Bi8YO8U")
|
|
}
|
|
|
|
fn test_resource() -> TokenResource {
|
|
TokenResource {
|
|
issuer: String::from("icarus_auth_test"),
|
|
message: String::from("Authorization"),
|
|
audiences: vec![String::from("icarus_test")],
|
|
id: uuid::Uuid::nil(),
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn test_token_scope_check() {
|
|
let mut token = Token::default();
|
|
token.scope = String::from("song:read song:upload song:download");
|
|
|
|
let check_scope = String::from("song:download");
|
|
let result = token.contains_scope(&check_scope);
|
|
|
|
assert!(
|
|
result,
|
|
"Error: The scope {:?} was not found in the token's scope {:?}",
|
|
check_scope, token.scope
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn test_token_creation() {
|
|
let key = test_key();
|
|
let test_token_resource = test_resource();
|
|
let token_expiration_duration = time::Duration::hours(2);
|
|
|
|
match create_token(&key, &test_token_resource, token_expiration_duration) {
|
|
Ok((token, expire_duration)) => {
|
|
assert_eq!(false, token.is_empty(), "Error: Token is empty");
|
|
assert!(
|
|
expire_duration > 0,
|
|
"Token expire duration is invalid {expire_duration:?}"
|
|
);
|
|
}
|
|
Err(err) => {
|
|
assert!(false, "Error: {err:?}");
|
|
}
|
|
}
|
|
}
|
|
|
|
#[test]
|
|
fn test_token_creation_with_id() {
|
|
let key = test_key();
|
|
let mut test_token_resource = test_resource();
|
|
test_token_resource.id = uuid::Uuid::new_v4();
|
|
let token_expiration_duration = time::Duration::hours(2);
|
|
|
|
match create_token(&key, &test_token_resource, token_expiration_duration) {
|
|
Ok((token, expire_duration)) => {
|
|
assert_eq!(false, token.is_empty(), "Error: Token is empty");
|
|
assert!(
|
|
expire_duration > 0,
|
|
"Token expire duration is invalid {expire_duration:?}"
|
|
);
|
|
}
|
|
Err(err) => {
|
|
assert!(false, "Error: {err:?}");
|
|
}
|
|
}
|
|
}
|
|
}
|