token.rs 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293
  1. use crate::{config, jwt, key, schema, UIDCError};
  2. use microrm::prelude::*;
  3. #[derive(Debug)]
  4. pub enum TokenError {
  5. DBError(microrm::Error),
  6. InternalError(&'static str),
  7. RequestError(&'static str),
  8. }
  9. impl From<microrm::Error> for TokenError {
  10. fn from(value: microrm::Error) -> Self {
  11. Self::DBError(value)
  12. }
  13. }
  14. impl From<ring::error::KeyRejected> for TokenError {
  15. fn from(_value: ring::error::KeyRejected) -> Self {
  16. Self::InternalError("could not load realm key")
  17. }
  18. }
  19. pub fn generate_access_token<'a>(
  20. config: &config::Config,
  21. realm: &schema::Realm,
  22. client: &schema::Client,
  23. user: &schema::User,
  24. scopes: impl Iterator<Item = &'a str>,
  25. ) -> Result<String, UIDCError> {
  26. let issuer = format!("{}/{}", config.base_url, realm.shortname,);
  27. let iat = std::time::SystemTime::now();
  28. let exp = iat + std::time::Duration::from_secs(config.auth_token_expiry);
  29. // find all roles the user can possibly have access to
  30. let mut user_roles = user.groups.join(schema::Group::Roles).get()?;
  31. // find all roles requested by the scopes
  32. let mut requested_roles = vec![];
  33. for scope_name in scopes {
  34. if let Some(scope) = realm
  35. .scopes
  36. .with(schema::Scope::Shortname, scope_name)
  37. .first()
  38. .get()?
  39. {
  40. requested_roles.extend(scope.roles.get()?.into_iter());
  41. }
  42. }
  43. user_roles.sort_by_key(|k| k.id());
  44. user_roles.dedup();
  45. requested_roles.sort_by_key(|k| k.id());
  46. requested_roles.dedup();
  47. // find the intersection between requested roles and the ones the user actually has
  48. let resulting_roles = requested_roles
  49. .into_iter()
  50. .filter(|req| user_roles.contains(req))
  51. .map(|role| Ok(serde_json::Value::String(role.wrapped().shortname)));
  52. let token = jwt::JWTData {
  53. sub: user.username.as_str(),
  54. iss: issuer.as_str(),
  55. aud: client.shortname.as_str(),
  56. iat: iat.duration_since(std::time::UNIX_EPOCH).unwrap().as_secs(),
  57. exp: exp.duration_since(std::time::UNIX_EPOCH).unwrap().as_secs(),
  58. extras: [(
  59. "roles",
  60. serde_json::Value::Array(resulting_roles.collect::<Result<Vec<_>, UIDCError>>()?),
  61. )]
  62. .into(),
  63. };
  64. let mut realmkeys = key::RealmKeys::new(realm.clone());
  65. let key = realmkeys
  66. .by_type(*client.key_type.as_ref())?
  67. .ok_or(UIDCError::Abort("no matching signing key for realm"))?;
  68. Ok(jwt::JWT::sign(&key, token).into_string())
  69. }
  70. pub fn generate_refresh_token<'a>(
  71. config: &config::Config,
  72. realm: &schema::Realm,
  73. client: &schema::Client,
  74. user: &schema::User,
  75. scopes: impl Iterator<Item = &'a str>,
  76. ) -> Result<String, UIDCError> {
  77. todo!()
  78. }