use std::{borrow::Cow, hash::Hash};
use iref::{Iri, IriBuf, UriBuf};
use serde::{Deserialize, Serialize};
use ssi_claims_core::{InvalidProof, MessageSignatureError, ProofValidationError, ProofValidity};
use ssi_jwk::JWK;
use ssi_verification_methods_core::{JwkVerificationMethod, VerificationMethodSet};
use static_iref::iri;
use crate::{
ExpectedType, GenericVerificationMethod, InvalidVerificationMethod, TypedVerificationMethod,
VerificationMethod,
};
pub const RSA_VERIFICATION_KEY_2018_TYPE: &str = "RsaVerificationKey2018";
#[derive(
Debug,
Clone,
PartialEq,
Eq,
Hash,
Serialize,
Deserialize,
linked_data::Serialize,
linked_data::Deserialize,
)]
#[serde(tag = "type", rename = "RsaVerificationKey2018")]
#[ld(prefix("sec" = "https://w3id.org/security#"))]
#[ld(type = "sec:RsaVerificationKey2018")]
pub struct RsaVerificationKey2018 {
#[ld(id)]
pub id: IriBuf,
#[ld("sec:controller")]
pub controller: UriBuf,
#[serde(rename = "publicKeyJwk")]
#[ld("sec:publicKeyJwk")]
pub public_key: Box<JWK>,
}
impl RsaVerificationKey2018 {
pub const NAME: &'static str = RSA_VERIFICATION_KEY_2018_TYPE;
pub const IRI: &'static Iri = iri!("https://w3id.org/security#RsaVerificationKey2018");
pub fn public_key_jwk(&self) -> &JWK {
&self.public_key
}
pub fn sign_bytes(
&self,
data: &[u8],
secret_key: &JWK,
) -> Result<Vec<u8>, MessageSignatureError> {
ssi_jws::sign_bytes(ssi_jwk::Algorithm::RS256, data, secret_key)
.map_err(|_| MessageSignatureError::InvalidSecretKey)
}
pub fn verify_bytes(
&self,
data: &[u8],
signature: &[u8],
) -> Result<ProofValidity, ProofValidationError> {
let result =
ssi_jws::verify_bytes(ssi_jwk::Algorithm::RS256, data, &self.public_key, signature);
match result {
Ok(()) => Ok(Ok(())),
Err(ssi_jws::Error::InvalidSignature) => Ok(Err(InvalidProof::Signature)),
Err(_) => Err(ProofValidationError::InvalidSignature),
}
}
}
impl VerificationMethod for RsaVerificationKey2018 {
fn id(&self) -> &Iri {
self.id.as_iri()
}
fn controller(&self) -> Option<&Iri> {
Some(self.controller.as_iri())
}
}
impl VerificationMethodSet for RsaVerificationKey2018 {
type TypeSet = &'static str;
fn type_set() -> Self::TypeSet {
Self::NAME
}
}
impl TypedVerificationMethod for RsaVerificationKey2018 {
fn expected_type() -> Option<ExpectedType> {
Some(RSA_VERIFICATION_KEY_2018_TYPE.to_string().into())
}
fn type_match(ty: &str) -> bool {
ty == RSA_VERIFICATION_KEY_2018_TYPE
}
fn type_(&self) -> &str {
RSA_VERIFICATION_KEY_2018_TYPE
}
}
impl JwkVerificationMethod for RsaVerificationKey2018 {
fn to_jwk(&self) -> Cow<JWK> {
Cow::Borrowed(self.public_key_jwk())
}
}
impl TryFrom<GenericVerificationMethod> for RsaVerificationKey2018 {
type Error = InvalidVerificationMethod;
fn try_from(mut m: GenericVerificationMethod) -> Result<Self, Self::Error> {
Ok(Self {
id: m.id,
controller: m.controller,
public_key: Box::new(
serde_json::from_value(
m.properties.remove("publicKeyJwk").ok_or_else(|| {
InvalidVerificationMethod::missing_property("publicKeyJwk")
})?,
)
.map_err(|_| InvalidVerificationMethod::invalid_property("publicKeyJwk"))?,
),
})
}
}