Skip to main content

cloudillo_types/
utils.rs

1// SPDX-FileCopyrightText: Szilárd Hajba
2// SPDX-License-Identifier: LGPL-3.0-or-later
3
4//! Utility functions
5
6use base64::{engine::general_purpose::URL_SAFE_NO_PAD, Engine};
7use serde::de::DeserializeOwned;
8
9use crate::prelude::*;
10use rand::RngExt;
11
12pub const ID_LENGTH: usize = 24;
13pub const SAFE: [char; 62] = [
14	'0', '1', '2', '3', '4', '5', '6', '7', '8', '9', 'a', 'b', 'c', 'd', 'e', 'f', 'g', 'h', 'i',
15	'j', 'k', 'l', 'm', 'n', 'o', 'p', 'q', 'r', 's', 't', 'u', 'v', 'w', 'x', 'y', 'z', 'A', 'B',
16	'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J', 'K', 'L', 'M', 'N', 'O', 'P', 'Q', 'R', 'S', 'T', 'U',
17	'V', 'W', 'X', 'Y', 'Z',
18];
19
20/// Derive default display name from id_tag
21///
22/// Takes first portion (before '.'), capitalizes first letter.
23///
24/// # Examples
25/// - `"home.w9.hu"` → `"Home"`
26/// - `"john.example.com"` → `"John"`
27/// - `"alice"` → `"Alice"`
28pub fn derive_name_from_id_tag(id_tag: &str) -> String {
29	let first_part = id_tag.split('.').next().unwrap_or(id_tag);
30	let mut chars = first_part.chars();
31	match chars.next() {
32		Some(c) => c.to_uppercase().chain(chars).collect(),
33		None => id_tag.to_string(),
34	}
35}
36
37pub fn random_id() -> ClResult<String> {
38	let mut rng = rand::rng();
39	let mut result = String::with_capacity(ID_LENGTH);
40
41	for _ in 0..ID_LENGTH {
42		result.push(SAFE[rng.random_range(0..SAFE.len())]);
43	}
44	Ok(result)
45}
46
47/// Decode a JWT payload without verifying the signature.
48///
49/// WARNING: This MUST always be followed by proper signature verification.
50/// It only peeks at the payload to determine routing info (issuer, key_id, etc.).
51pub fn decode_jwt_no_verify<T: DeserializeOwned>(jwt: &str) -> ClResult<T> {
52	let mut parts = jwt.splitn(3, '.');
53	let _header = parts.next().ok_or(Error::Parse)?;
54	let payload = parts.next().ok_or(Error::Parse)?;
55	let _sig = parts.next().ok_or(Error::Parse)?;
56	let payload = URL_SAFE_NO_PAD.decode(payload.as_bytes()).map_err(|_| Error::Parse)?;
57	let payload: T = serde_json::from_slice(&payload).map_err(|_| Error::Parse)?;
58	Ok(payload)
59}
60
61/// Parse and validate an identity id_tag against a registrar's domain.
62///
63/// Splits a fully-qualified identity id_tag (e.g., "alice.example.com") into prefix and domain
64/// components, validating that the domain matches the registrar's domain.
65pub fn parse_and_validate_identity_id_tag(
66	id_tag: &str,
67	registrar_domain: &str,
68) -> ClResult<(String, String)> {
69	// Validate inputs
70	if registrar_domain.is_empty() {
71		return Err(Error::ValidationError("Registrar domain cannot be empty".to_string()));
72	}
73	if id_tag.is_empty() {
74		return Err(Error::ValidationError("Identity id_tag cannot be empty".to_string()));
75	}
76
77	// Check if id_tag ends with the registrar's domain as a suffix with a dot separator
78	let domain_with_dot = format!(".{}", registrar_domain);
79	if let Some(pos) = id_tag.rfind(&domain_with_dot) {
80		let prefix = id_tag[..pos].to_string();
81		if prefix.is_empty() {
82			return Err(Error::ValidationError(
83				"Invalid id_tag: prefix cannot be empty (id_tag must be in format 'prefix.domain')"
84					.to_string(),
85			));
86		}
87		Ok((prefix, registrar_domain.to_string()))
88	} else if id_tag == registrar_domain {
89		// Special case: id_tag is exactly the domain (empty prefix)
90		Err(Error::ValidationError(
91			"Invalid id_tag: prefix cannot be empty (id_tag must be in format 'prefix.domain')"
92				.to_string(),
93		))
94	} else {
95		Err(Error::ValidationError(format!(
96			"Identity id_tag '{}' does not match registrar domain '{}'",
97			id_tag, registrar_domain
98		)))
99	}
100}
101
102#[cfg(test)]
103mod tests {
104	use super::*;
105
106	#[test]
107	fn test_derive_name_from_id_tag() {
108		assert_eq!(derive_name_from_id_tag("home.w9.hu"), "Home");
109		assert_eq!(derive_name_from_id_tag("john.example.com"), "John");
110		assert_eq!(derive_name_from_id_tag("alice"), "Alice");
111		assert_eq!(derive_name_from_id_tag("UPPER.test"), "UPPER");
112		assert_eq!(derive_name_from_id_tag(""), "");
113	}
114
115	#[test]
116	fn test_simple_valid_identity() {
117		let result = parse_and_validate_identity_id_tag("alice.example.com", "example.com");
118		assert!(result.is_ok());
119		let (prefix, domain) = result.unwrap();
120		assert_eq!(prefix, "alice");
121		assert_eq!(domain, "example.com");
122	}
123
124	#[test]
125	fn test_multi_part_prefix_valid() {
126		let result = parse_and_validate_identity_id_tag("alice.bob.example.com", "example.com");
127		assert!(result.is_ok());
128		let (prefix, domain) = result.unwrap();
129		assert_eq!(prefix, "alice.bob");
130		assert_eq!(domain, "example.com");
131	}
132
133	#[test]
134	fn test_empty_prefix_fails() {
135		let result = parse_and_validate_identity_id_tag("example.com", "example.com");
136		assert!(result.is_err());
137	}
138
139	#[test]
140	fn test_domain_mismatch_fails() {
141		let result = parse_and_validate_identity_id_tag("alice.other.com", "example.com");
142		assert!(result.is_err());
143	}
144
145	#[test]
146	fn test_empty_id_tag_fails() {
147		let result = parse_and_validate_identity_id_tag("", "example.com");
148		assert!(result.is_err());
149	}
150
151	#[test]
152	fn test_empty_registrar_domain_fails() {
153		let result = parse_and_validate_identity_id_tag("alice.example.com", "");
154		assert!(result.is_err());
155	}
156}
157
158// vim: ts=4