libmacaroon-rs
Rust implementation of macaroons.
This started as a project to learn Rust, and sort of mophed into a fully-functional Macaroon implementation.
What are Macaroons?
Macaroons are bearer tokens (similar to cookies) which encode within them criteria within which the authorization is allowed to take place (referred to as "caveats"). For instance, authorization could be restricted to a particular user, account, time of day, really anything. These criteria can be either evaluated locally (a "first-party caveat"), or using special macaroons ("discharge macaroons") generated by a third party (a "third-party caveat").
A first-party caveat consists simply of a predicate which, when evaluated as true, authorizes the caveat.
The predicate is a string which is either evaluated using strict string comparison (satisfy_exact),
or interpreted using a provided function (satisfy_general).
A third-party caveat consists of a location string, an identifier, and a specially-generated signing key to authenticate the generated discharge macaroons. The key and identifier is passed to the third-party who generates the discharge macaroons. The receiver then binds each discharge macaroon to the original macaroon.
During verification of a third-party caveat, a discharge macaroon is found from those received whose identifier matches that of the caveat. The binding signature is verified, and the discharge macaroon's caveats are verified using the same process as the original macaroon.
The macaroon is considered authorized only if all its caveats are authorized by the above process.
Functionality Implemented
- Creating macaroons, and adding first- and third-party caveats
- Serialization - versions 1, 2 & 2J are supported
- Validation (mostly for validating deserialized macaroons)
- Creation of discharge macaroons
- Verification of both first- and third-party caveats (the latter using discharge macaroons)
Requirements
For now, you need to use the nightly build of Rust, because of serde_derive's dependence on
#[proc_macro_derive], which is experimental (but should be merged into stable soon).
To use the nightly compiler:
Usage
In your Cargo.toml:
[dependencies]
macaroon = 0.1.1
Examples
extern crate macaroon;
use ;
// Initialize to make crypto primitives thread-safe
initialize.unwrap; // Force panic if initialization fails
// Create our macaroon
let mut macaroon = match create ;
// Add our first-party caveat. We say that only someone with account 12345678
// is authorized to access whatever the macaroon is protecting
// Note that we can add however many of these we want, with different predicates
macaroon.add_first_party_caveat;
// Now we verify the macaroon
// First we create the verifier
let mut verifier = new;
// We assert that the account number is "12345678"
verifier.satisfy_exact;
// Now we verify the macaroon. It should return `Ok(true)` if the user is authorized
match macaroon.verify
// Now, let's add a third-party caveat, which just says that we need our third party
// to authorize this for us as well.
macaroon.add_third_party_caveat;
// When we're ready to verify a third-party caveat, we use the location
// (in this case, "https://auth.mybank") to retrieve the discharge macaroons we use to verify.
// These would be created by the third party like so:
let mut discharge = match create ;
// And this is the criterion the third party requires for authorization
discharge.add_first_party_caveat;
// Once we receive the discharge macaroon, we bind it to the original macaroon
macaroon.bind;
// Then we can verify using the same verifier (which will verify both the existing
// first-party caveat and the third party one)
verifier.add_discharge_macaroons;
match macaroon.verify