use crate::{
cdk::structures::{DefaultMemoryImpl, cell::Cell, memory::VirtualMemory},
eager_static, ic_memory,
memory::impl_storable_unbounded,
storage::{prelude::*, stable::memory::auth::AUTH_STATE_ID},
};
use std::cell::RefCell;
mod key_state;
mod records;
mod sessions;
mod token_uses;
pub use records::{
AttestationKeyStatusRecord, AttestationPublicKeyRecord, AuthStateRecord,
DelegatedSessionBootstrapBindingRecord, DelegatedSessionRecord, DelegatedTokenUseRecord,
};
pub use sessions::DelegatedSessionUpsertResult;
pub use token_uses::DelegatedTokenUseConsumeResult;
const DELEGATED_SESSION_CAPACITY: usize = 2_048;
const DELEGATED_SESSION_SUBJECT_CAPACITY: usize = 128;
const DELEGATED_SESSION_BOOTSTRAP_BINDING_CAPACITY: usize = 4_096;
const DELEGATED_SESSION_BOOTSTRAP_BINDING_SUBJECT_CAPACITY: usize = 256;
const DELEGATED_TOKEN_USE_CAPACITY: usize = 8_192;
eager_static! {
pub(super) static AUTH_STATE: RefCell<Cell<AuthStateRecord, VirtualMemory<DefaultMemoryImpl>>> =
RefCell::new(Cell::init(
ic_memory!(AuthState, AUTH_STATE_ID),
AuthStateRecord::default(),
));
}
impl_storable_unbounded!(AuthStateRecord);
pub struct AuthState;
impl AuthState {
#[must_use]
pub(crate) fn get_active_delegated_session(
wallet_pid: Principal,
now_secs: u64,
) -> Option<DelegatedSessionRecord> {
AUTH_STATE.with_borrow_mut(|cell| {
let mut data = cell.get().clone();
let session = sessions::get_active_delegated_session(
&mut data.delegated_sessions,
wallet_pid,
now_secs,
);
if session.is_none() {
cell.set(data);
}
session
})
}
#[cfg(test)]
pub(crate) fn upsert_delegated_session(
session: DelegatedSessionRecord,
now_secs: u64,
) -> DelegatedSessionUpsertResult {
AUTH_STATE.with_borrow_mut(|cell| {
let mut data = cell.get().clone();
let result = sessions::upsert_delegated_session(
&mut data.delegated_sessions,
session,
now_secs,
DELEGATED_SESSION_CAPACITY,
DELEGATED_SESSION_SUBJECT_CAPACITY,
);
if matches!(result, DelegatedSessionUpsertResult::Upserted) {
cell.set(data);
}
result
})
}
pub(crate) fn upsert_delegated_session_with_bootstrap_binding(
session: DelegatedSessionRecord,
binding: DelegatedSessionBootstrapBindingRecord,
now_secs: u64,
) -> DelegatedSessionUpsertResult {
AUTH_STATE.with_borrow_mut(|cell| {
let mut data = cell.get().clone();
let result = sessions::upsert_delegated_session_with_bootstrap_binding(
&mut data.delegated_sessions,
&mut data.delegated_session_bootstrap_bindings,
session,
binding,
now_secs,
sessions::DelegatedSessionCapacityLimits {
session: DELEGATED_SESSION_CAPACITY,
session_subject: DELEGATED_SESSION_SUBJECT_CAPACITY,
binding: DELEGATED_SESSION_BOOTSTRAP_BINDING_CAPACITY,
binding_subject: DELEGATED_SESSION_BOOTSTRAP_BINDING_SUBJECT_CAPACITY,
},
);
if matches!(result, DelegatedSessionUpsertResult::Upserted) {
cell.set(data);
}
result
})
}
pub(crate) fn clear_delegated_session(wallet_pid: Principal) {
AUTH_STATE.with_borrow_mut(|cell| {
let mut data = cell.get().clone();
sessions::clear_delegated_session(&mut data.delegated_sessions, wallet_pid);
cell.set(data);
});
}
pub(crate) fn prune_expired_delegated_sessions(now_secs: u64) -> usize {
AUTH_STATE.with_borrow_mut(|cell| {
let mut data = cell.get().clone();
let removed =
sessions::prune_expired_delegated_sessions(&mut data.delegated_sessions, now_secs);
if removed > 0 {
cell.set(data);
}
removed
})
}
#[must_use]
pub(crate) fn get_active_delegated_session_bootstrap_binding(
token_fingerprint: [u8; 32],
now_secs: u64,
) -> Option<DelegatedSessionBootstrapBindingRecord> {
AUTH_STATE.with_borrow_mut(|cell| {
let mut data = cell.get().clone();
let binding = sessions::get_active_delegated_session_bootstrap_binding(
&mut data.delegated_session_bootstrap_bindings,
token_fingerprint,
now_secs,
);
if binding.is_none() {
cell.set(data);
}
binding
})
}
pub(crate) fn prune_expired_delegated_session_bootstrap_bindings(now_secs: u64) -> usize {
AUTH_STATE.with_borrow_mut(|cell| {
let mut data = cell.get().clone();
let removed = sessions::prune_expired_delegated_session_bootstrap_bindings(
&mut data.delegated_session_bootstrap_bindings,
now_secs,
);
if removed > 0 {
cell.set(data);
}
removed
})
}
pub(crate) fn consume_delegated_token_use(
token_use: DelegatedTokenUseRecord,
now_secs: u64,
) -> DelegatedTokenUseConsumeResult {
AUTH_STATE.with_borrow_mut(|cell| {
let mut data = cell.get().clone();
let previous_uses = data.delegated_token_uses.clone();
let result = token_uses::consume_delegated_token_use(
&mut data.delegated_token_uses,
token_use,
now_secs,
DELEGATED_TOKEN_USE_CAPACITY,
);
if matches!(result, DelegatedTokenUseConsumeResult::Consumed)
|| data.delegated_token_uses != previous_uses
{
cell.set(data);
}
result
})
}
#[must_use]
pub(crate) fn get_attestation_public_key(
key_id: u32,
key_name: &str,
) -> Option<AttestationPublicKeyRecord> {
AUTH_STATE
.with_borrow(|cell| key_state::get_attestation_public_key(cell.get(), key_id, key_name))
}
#[must_use]
pub(crate) fn get_attestation_public_keys(key_name: &str) -> Vec<AttestationPublicKeyRecord> {
AUTH_STATE.with_borrow(|cell| key_state::get_attestation_public_keys(cell.get(), key_name))
}
pub(crate) fn set_attestation_public_keys(keys: Vec<AttestationPublicKeyRecord>) {
AUTH_STATE.with_borrow_mut(|cell| {
let mut data = cell.get().clone();
key_state::set_attestation_public_keys(&mut data, keys);
cell.set(data);
});
}
pub(crate) fn upsert_attestation_public_key(key: AttestationPublicKeyRecord) {
AUTH_STATE.with_borrow_mut(|cell| {
let mut data = cell.get().clone();
key_state::upsert_attestation_public_key(&mut data, key);
cell.set(data);
});
}
}