1use std::collections::HashSet;
2
3use base64ct::{Base64UrlUnpadded, Encoding};
4use coarsetime::{Duration, UnixTimeStamp};
5
6use crate::{claims::DEFAULT_TIME_TOLERANCE_SECS, ensure, JWTError};
7
8pub const DEFAULT_MAX_TOKEN_LENGTH: usize = 1_000_000;
9
10#[derive(Clone, Debug, PartialEq, Eq)]
13pub struct VerificationOptions {
14 pub reject_before: Option<UnixTimeStamp>,
20
21 pub accept_future: bool,
23
24 pub required_subject: Option<String>,
26
27 pub required_key_id: Option<String>,
29
30 pub required_public_key: Option<String>,
32
33 pub required_nonce: Option<String>,
35
36 pub allowed_issuers: Option<HashSet<String>>,
38
39 pub allowed_audiences: Option<HashSet<String>>,
41
42 pub time_tolerance: Option<Duration>,
44
45 pub max_validity: Option<Duration>,
47
48 pub max_token_length: Option<usize>,
50
51 pub max_header_length: Option<usize>,
53}
54
55impl Default for VerificationOptions {
56 fn default() -> Self {
57 Self {
58 reject_before: None,
59 accept_future: false,
60 required_subject: None,
61 required_key_id: None,
62 required_public_key: None,
63 required_nonce: None,
64 allowed_issuers: None,
65 allowed_audiences: None,
66 time_tolerance: Some(Duration::from_secs(DEFAULT_TIME_TOLERANCE_SECS)),
67 max_validity: None,
68 max_token_length: Some(DEFAULT_MAX_TOKEN_LENGTH),
69 max_header_length: None,
70 }
71 }
72}
73
74#[derive(Debug, Clone, Default)]
78pub struct KeyMetadata {
79 pub(crate) key_set_url: Option<String>,
80 pub(crate) public_key: Option<String>,
81 pub(crate) certificate_url: Option<String>,
82 pub(crate) certificate_sha256_thumbprint: Option<String>,
83}
84
85impl KeyMetadata {
86 pub fn with_key_set_url(mut self, key_set_url: impl ToString) -> Self {
88 self.key_set_url = Some(key_set_url.to_string());
89 self
90 }
91
92 pub fn with_public_key(mut self, public_key: impl ToString) -> Self {
94 self.public_key = Some(public_key.to_string());
95 self
96 }
97
98 pub fn with_certificate_url(mut self, certificate_url: impl ToString) -> Self {
100 self.certificate_url = Some(certificate_url.to_string());
101 self
102 }
103
104 pub fn with_certificate_sha256_thumbprint(
106 mut self,
107 certificate_sha256_thumbprint: impl ToString,
108 ) -> Result<Self, JWTError> {
109 let thumbprint = certificate_sha256_thumbprint.to_string();
110 let mut bin = [0u8; 32];
111 if thumbprint.len() == 64 {
112 hex::decode_to_slice(&thumbprint, &mut bin)?;
113 let thumbprint = Base64UrlUnpadded::encode_string(&bin);
114 self.certificate_sha256_thumbprint = Some(thumbprint);
115 return Ok(self);
116 }
117 ensure!(
118 Base64UrlUnpadded::decode(&thumbprint, &mut bin)?.len() == bin.len(),
119 JWTError::InvalidCertThumprint
120 );
121 self.certificate_sha256_thumbprint = Some(thumbprint);
122 Ok(self)
123 }
124}
125
126#[cfg(feature = "hmac")]
127#[inline(never)]
128pub(crate) fn timingsafe_eq(a: &[u8], b: &[u8]) -> bool {
129 if a.len() != b.len() {
130 return false;
131 }
132 a.iter().zip(b.iter()).fold(0, |c, (x, y)| c | (x ^ y)) == 0
133}