1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
use chrono::Utc;
use libsodium_sys::{
crypto_sign_ed25519_sk_to_pk,
crypto_sign_PUBLICKEYBYTES as CRYPTO_SIGN_PUBLICKEYBYTES
};
use crate::error::NcryptfError as Error;
use serde::{Serialize, Deserialize};
#[derive(Debug, Clone, Serialize, Deserialize)]
pub struct Token {
pub access_token: String,
pub refresh_token: String,
pub ikm: Vec<u8>,
pub signature: Vec<u8>,
pub expires_at: i64
}
impl Token {
pub fn from(access_token: String, refresh_token: String, ikm: Vec<u8>, signature: Vec<u8>, expires_at: i64) -> Result<Token, Error> {
if ikm.len() != 32 {
return Err(Error::InvalidArgument(format!("Initial key material should be {} bytes", 32)));
}
if signature.len() != 64 {
return Err(Error::InvalidArgument(format!("Signature secret key should be {} bytes", 64)));
}
return Ok(Self {
access_token,
refresh_token,
ikm,
signature,
expires_at,
});
}
pub fn from_json(json: serde_json::Value) -> Result<Self, Error> {
if json.get("access_token").is_none() ||
json.get("refresh_token").is_none() ||
json.get("ikm").is_none() ||
json.get("signing").is_none() ||
json.get("expires_at").is_none() {
return Err(Error::InvalidArgument(format!("The provided JSON object is not valid for tokenization.")));
}
return match Token::from(
json.get("access_token").unwrap().to_string(),
json.get("refresh_token").unwrap().to_string(),
base64::decode(json.get("ikm").unwrap().as_str().unwrap()).unwrap(),
base64::decode(json.get("signing").unwrap().as_str().unwrap()).unwrap(),
json.get("expires_at").unwrap().as_i64().unwrap()
) {
Ok(token) => return Ok(token),
Err(_error) => Err(_error)
}
}
pub fn is_expired(&self) -> bool {
let now = Utc::now().timestamp();
return now > self.expires_at;
}
pub fn get_signature_public_key(&self) -> Result<Vec<u8>, Error> {
let mut public: [u8; (CRYPTO_SIGN_PUBLICKEYBYTES as usize) as usize] = [0u8; (CRYPTO_SIGN_PUBLICKEYBYTES as usize)];
let sk = self.signature.clone().as_ptr();
let result = unsafe { crypto_sign_ed25519_sk_to_pk(public.as_mut_ptr(), sk) };
if result == 0 {
return Ok(public.as_ref().to_owned());
}
return Err(Error::TokenSignatureSize(format!("Signature secret key should be {} bytes", 64)));
}
}