use crate::dto::auth::DelegationCert;
use crate::ops::ic::IcOps;
#[cfg(test)]
use crate::{
InternalError,
cdk::types::Principal,
dto::auth::{AttestationKey, DelegatedToken, RoleAttestation, SignedRoleAttestation},
ops::storage::auth::DelegationStateOps,
workflow::prelude::CanisterRole,
};
mod attestation;
pub mod audience;
mod boundary;
mod crypto;
mod delegation;
mod error;
mod keys;
mod token;
mod types;
mod verify;
pub use boundary::{BootstrapTokenAudienceSubset, DelegatedSessionExpiryClamp};
pub use error::{
DelegatedTokenOpsError, DelegationExpiryError, DelegationScopeError, DelegationSignatureError,
DelegationValidationError,
};
pub use types::{
TokenAudience, TokenGrant, TokenLifetime, VerifiedDelegatedToken, VerifiedTokenClaims,
};
const DERIVATION_NAMESPACE: &[u8] = b"canic";
const ROOT_PATH_SEGMENT: &[u8] = b"root";
const SHARD_PATH_SEGMENT: &[u8] = b"shard";
const ATTESTATION_PATH_SEGMENT: &[u8] = b"attestation";
const CERT_SIGNING_DOMAIN: &[u8] = b"CANIC_DELEGATION_CERT_V1";
const TOKEN_SIGNING_DOMAIN: &[u8] = b"CANIC_DELEGATED_TOKEN_V1";
const ROLE_ATTESTATION_SIGNING_DOMAIN: &[u8] = b"CANIC_ROLE_ATTESTATION_V1";
const ROLE_ATTESTATION_KEY_ID_V1: u32 = 1;
pub struct DelegatedTokenOps;
impl DelegatedTokenOps {
pub async fn prewarm_root_key_material() -> Result<(), crate::InternalError> {
let root_pid = IcOps::canister_self();
let now_secs = IcOps::now_secs();
let delegated_key_name = keys::delegated_tokens_key_name()?;
keys::ensure_root_public_key_cached(&delegated_key_name, root_pid).await?;
let attestation_key_name = keys::attestation_key_name()?;
keys::ensure_attestation_key_cached(&attestation_key_name, root_pid, now_secs).await?;
Ok(())
}
}
pub fn delegation_cert_hash(cert: &DelegationCert) -> [u8; 32] {
crypto::cert_hash(cert)
}
#[cfg(test)]
fn verify_role_attestation_claims(
payload: &RoleAttestation,
caller: Principal,
self_pid: Principal,
verifier_subnet: Option<Principal>,
now_secs: u64,
min_accepted_epoch: u64,
) -> Result<(), DelegatedTokenOpsError> {
verify::verify_role_attestation_claims(
payload,
caller,
self_pid,
verifier_subnet,
now_secs,
min_accepted_epoch,
)
}
#[cfg(test)]
fn attestation_keys_sorted() -> Vec<AttestationKey> {
keys::attestation_keys_sorted()
}
#[cfg(test)]
fn root_derivation_path() -> Vec<Vec<u8>> {
keys::root_derivation_path()
}
#[cfg(test)]
fn attestation_derivation_path() -> Vec<Vec<u8>> {
keys::attestation_derivation_path()
}
#[cfg(test)]
fn role_attestation_hash(attestation: &RoleAttestation) -> Result<[u8; 32], InternalError> {
crypto::role_attestation_hash(attestation)
}
#[cfg(test)]
fn trace_token_trust_chain(
token: &DelegatedToken,
authority_pid: Principal,
now_secs: u64,
self_pid: Principal,
) -> (Vec<&'static str>, Result<(), InternalError>) {
verify::trace_token_trust_chain(token, authority_pid, now_secs, self_pid)
}
#[cfg(test)]
fn trace_token_trust_chain_with_forced_current_proof_failure(
token: &DelegatedToken,
authority_pid: Principal,
now_secs: u64,
self_pid: Principal,
err: InternalError,
) -> (Vec<&'static str>, Result<(), InternalError>) {
verify::trace_token_trust_chain_with_forced_current_proof_failure(
token,
authority_pid,
now_secs,
self_pid,
err,
)
}
#[cfg(test)]
mod tests;