use std::{
env,
fmt::Debug,
ops::Add,
time::{Duration, SystemTime, UNIX_EPOCH},
};
use jsonwebtoken::{self, DecodingKey, EncodingKey, Header};
use serde::{Deserialize, Serialize};
use thiserror::Error;
use crate::get_env_keys;
pub const DEFAULT_TTL: Duration = Duration::from_secs(3600 * 6); #[derive(Debug, Error)]
pub enum AccessTokenError {
#[error("Invalid API Key or Secret Key")]
InvalidKeys,
#[error("Invalid environment")]
InvalidEnv(#[from] env::VarError),
#[error("invalid claims: {0}")]
InvalidClaims(&'static str),
#[error("failed to encode jwt")]
Encoding(#[from] jsonwebtoken::errors::Error),
}
#[derive(Debug, Clone, Serialize, Deserialize)]
#[serde(rename_all = "camelCase")]
pub struct VideoGrants {
pub room_create: bool,
pub room_list: bool,
pub room_record: bool,
pub room_admin: bool,
pub room_join: bool,
pub room: String,
pub can_publish: bool,
pub can_subscribe: bool,
pub can_publish_data: bool,
pub can_publish_sources: Vec<String>, pub can_update_own_metadata: bool,
pub ingress_admin: bool, pub hidden: bool,
pub recorder: bool,
}
impl Default for VideoGrants {
fn default() -> Self {
Self {
room_create: false,
room_list: false,
room_record: false,
room_admin: false,
room_join: false,
room: "".to_string(),
can_publish: true,
can_subscribe: true,
can_publish_data: true,
can_publish_sources: Vec::default(),
can_update_own_metadata: false,
ingress_admin: false,
hidden: false,
recorder: false,
}
}
}
#[derive(Debug, Clone, Serialize, Default, Deserialize)]
#[serde(default)]
#[serde(rename_all = "camelCase")]
pub struct Claims {
pub exp: usize, pub iss: String, pub nbf: usize,
pub sub: String, pub name: String,
pub video: VideoGrants,
pub sha256: String, pub metadata: String,
}
#[derive(Clone)]
pub struct AccessToken {
api_key: String,
api_secret: String,
claims: Claims,
}
impl Debug for AccessToken {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
f.debug_struct("AccessToken")
.field("api_key", &self.api_key)
.field("claims", &self.claims)
.finish()
}
}
impl AccessToken {
pub fn with_api_key(api_key: &str, api_secret: &str) -> Self {
let now = SystemTime::now().duration_since(UNIX_EPOCH).unwrap();
Self {
api_key: api_key.to_owned(),
api_secret: api_secret.to_owned(),
claims: Claims {
exp: now.add(DEFAULT_TTL).as_secs() as usize,
iss: api_key.to_owned(),
nbf: now.as_secs() as usize,
sub: Default::default(),
name: Default::default(),
video: VideoGrants::default(),
sha256: Default::default(),
metadata: Default::default(),
},
}
}
pub fn new() -> Result<Self, AccessTokenError> {
let (api_key, api_secret) = get_env_keys()?;
Ok(Self::with_api_key(&api_key, &api_secret))
}
pub fn with_ttl(mut self, ttl: Duration) -> Self {
let time = SystemTime::now().duration_since(UNIX_EPOCH).unwrap() + ttl;
self.claims.exp = time.as_secs() as usize;
self
}
pub fn with_grants(mut self, grants: VideoGrants) -> Self {
self.claims.video = grants;
self
}
pub fn with_identity(mut self, identity: &str) -> Self {
self.claims.sub = identity.to_owned();
self
}
pub fn with_name(mut self, name: &str) -> Self {
self.claims.name = name.to_owned();
self
}
pub fn with_metadata(mut self, metadata: &str) -> Self {
self.claims.metadata = metadata.to_owned();
self
}
pub fn with_sha256(mut self, sha256: &str) -> Self {
self.claims.sha256 = sha256.to_owned();
self
}
pub fn to_jwt(self) -> Result<String, AccessTokenError> {
if self.api_key.is_empty() || self.api_secret.is_empty() {
return Err(AccessTokenError::InvalidKeys);
}
if self.claims.video.room_join
&& (self.claims.sub.is_empty() || self.claims.video.room.is_empty())
{
return Err(AccessTokenError::InvalidClaims(
"token grants room_join but doesn't have an identity or room",
));
}
Ok(jsonwebtoken::encode(
&Header::new(jsonwebtoken::Algorithm::HS256),
&self.claims,
&EncodingKey::from_secret(self.api_secret.as_ref()),
)?)
}
}
#[derive(Clone)]
pub struct TokenVerifier {
api_key: String,
api_secret: String,
}
impl Debug for TokenVerifier {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
f.debug_struct("TokenVerifier").field("api_key", &self.api_key).finish()
}
}
impl TokenVerifier {
pub fn with_api_key(api_key: &str, api_secret: &str) -> Self {
Self { api_key: api_key.to_owned(), api_secret: api_secret.to_owned() }
}
pub fn new() -> Result<Self, AccessTokenError> {
let (api_key, api_secret) = get_env_keys()?;
Ok(Self::with_api_key(&api_key, &api_secret))
}
pub fn verify(&self, token: &str) -> Result<Claims, AccessTokenError> {
let mut validation = jsonwebtoken::Validation::new(jsonwebtoken::Algorithm::HS256);
validation.validate_exp = true;
validation.validate_nbf = true;
validation.set_issuer(&[&self.api_key]);
let token = jsonwebtoken::decode::<Claims>(
token,
&DecodingKey::from_secret(self.api_secret.as_ref()),
&validation,
)?;
Ok(token.claims)
}
}
#[cfg(test)]
mod tests {
use std::time::Duration;
use super::{AccessToken, TokenVerifier, VideoGrants};
const TEST_API_KEY: &str = "myapikey";
const TEST_API_SECRET: &str = "thiskeyistotallyunsafe";
#[test]
fn test_access_token() {
let token = AccessToken::with_api_key(TEST_API_KEY, TEST_API_SECRET)
.with_ttl(Duration::from_secs(60))
.with_identity("test")
.with_name("test")
.with_grants(VideoGrants::default())
.to_jwt()
.unwrap();
let verifier = TokenVerifier::with_api_key(TEST_API_KEY, TEST_API_SECRET);
let claims = verifier.verify(&token).unwrap();
assert_eq!(claims.sub, "test");
assert_eq!(claims.name, "test");
assert_eq!(claims.iss, TEST_API_KEY);
let incorrect_issuer = TokenVerifier::with_api_key("incorrect", TEST_API_SECRET);
assert!(incorrect_issuer.verify(&token).is_err());
let incorrect_token = TokenVerifier::with_api_key(TEST_API_KEY, "incorrect");
assert!(incorrect_token.verify(&token).is_err());
}
}