1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
use crate::software_vault::SoftwareVault;
use crate::VaultError;
use ockam_core::hex::encode;
use ockam_vault_core::{Hasher, KeyId, KeyIdVault, PublicKey, Secret};

impl KeyIdVault for SoftwareVault {
    fn get_secret_by_key_id(&self, key_id: &str) -> ockam_core::Result<Secret> {
        let index = self
            .entries
            .iter()
            .find(|(_, entry)| {
                if let Some(e_key_id) = entry.key_id() {
                    e_key_id == key_id
                } else {
                    false
                }
            })
            .ok_or_else(|| Into::<ockam_core::Error>::into(VaultError::SecretNotFound))?
            .0;

        Ok(Secret::new(*index))
    }

    fn compute_key_id_for_public_key(&self, public_key: &PublicKey) -> ockam_core::Result<KeyId> {
        let key_id = self.sha256(public_key.as_ref())?;
        Ok(encode(key_id))
    }
}

#[cfg(test)]
mod tests {
    use crate::SoftwareVault;
    use ockam_core::hex::decode;
    use ockam_vault_core::{
        KeyIdVault, PublicKey, SecretAttributes, SecretPersistence, SecretType, SecretVault,
        CURVE25519_SECRET_LENGTH,
    };

    #[test]
    fn compute_key_id_for_public_key() {
        let vault = SoftwareVault::new();

        let public =
            decode("68858ea1ea4e1ade755df7fb6904056b291d9781eb5489932f46e32f12dd192a").unwrap();
        let public = PublicKey::new(public.to_vec());

        let key_id = vault.compute_key_id_for_public_key(&public).unwrap();

        assert_eq!(
            key_id,
            "732af49a0b47c820c0a4cac428d6cb80c1fa70622f4a51708163dd87931bc942"
        );
    }

    #[test]
    fn get_secret_by_key_id() {
        let mut vault = SoftwareVault::new();

        let attributes = SecretAttributes::new(
            SecretType::Curve25519,
            SecretPersistence::Ephemeral,
            CURVE25519_SECRET_LENGTH,
        );

        let secret = vault.secret_generate(attributes).unwrap();
        let public = vault.secret_public_key_get(&secret).unwrap();

        let key_id = vault.compute_key_id_for_public_key(&public).unwrap();
        let secret2 = vault.get_secret_by_key_id(&key_id).unwrap();

        assert_eq!(secret.index(), secret2.index());
    }
}