diff --git a/Cargo.toml b/Cargo.toml new file mode 100644 index 0000000..0bb02c0 --- /dev/null +++ b/Cargo.toml @@ -0,0 +1,36 @@ +[package] +name = "pasetoken-lib" +authors = ["Jesus Perez "] +version = "0.1.0" +edition = "2021" +resolver = "2" + +# For better Features Sync among project packages better use a tool like "configure -i" at project root +# Here you can enable and disable dependencies and change the crypto provider +# implementation used in SAL - just change the default features list +[features] +default = [ "log-flex" ] +log-flex = ["flexi_logger"] +log-trace = ["tracing","tracing-subscriber","tracing-appender"] +log-quiet = [] + +[dependencies] +log = { version = "0.4.19", features = ["max_level_trace","release_max_level_trace"], package = "log" } + +# Log as log_flexi feature +flexi_logger = { version = "0.25.5", optional = true } + +# Log as log_trace feature +tracing = { version = "0.1.37", optional = true } +tracing-subscriber = { version = "0.3.17", features = ["fmt","json"], optional = true } +tracing-appender = { version = "0.2.2", optional = true } + +serde = { version = "1.0.171", features = ["derive"] } +serde_derive = "1.0.171" +serde_json = "1.0.103" +toml = "0.7.6" + +pasetors = "0.6.7" +[dev-dependencies] +env_logger = "0.10.0" +test-log = "0.2.12" diff --git a/src/lib.rs b/src/lib.rs new file mode 100644 index 0000000..c0d5bca --- /dev/null +++ b/src/lib.rs @@ -0,0 +1,39 @@ + +pub mod pasetoken; +#[cfg(test)] +mod test_pasetoken; + +use std::collections::HashMap; + +pub use self::pasetoken::{ConfigPaSeToken, PaSeToken}; + +// pub use self::pasetoken::ConfigPaSeToken::{ +// token_from_file_defs, +// from_content, +// make_footer, +// }; +pub type BxDynResult = std::result::Result>; + +pub fn generate_keys(path: &str, mode: bool) -> BxDynResult<()> { + let config_pasetoken: ConfigPaSeToken = ConfigPaSeToken::new( + String::from(""), + String::from(""), + mode, + String::from(""), + HashMap::new(), + HashMap::new(), + false + ); + let pasetoken = config_pasetoken.pasetoken()?; + if mode { + pasetoken.to_path_bin( + &format!("{}/public.ky",path), + &format!("{}/secret.ky",path) + ) + } else { + pasetoken.to_path( + &format!("{}/public.ky",path), + &format!("{}/secret.ky",path) + ) + } +} diff --git a/src/pasetoken.rs b/src/pasetoken.rs new file mode 100644 index 0000000..0aa1b54 --- /dev/null +++ b/src/pasetoken.rs @@ -0,0 +1,343 @@ +use pasetors::{ + claims::{Claims, ClaimsValidationRules}, + paserk::FormatAsPaserk, + footer::Footer, + keys::{Generate, AsymmetricKeyPair, AsymmetricSecretKey, AsymmetricPublicKey}, + public, Public, version4::V4, + token::{UntrustedToken, TrustedToken}, +}; +use core::convert::TryFrom; +use std::collections::HashMap; + +use serde::{Serialize,Deserialize,Deserializer,Serializer}; +use std::io; +use std::io::prelude::*; +use std::fs::File; + +type BxDynResult = std::result::Result>; + +fn read_byte_file(path: &str) -> io::Result> { + let mut f = File::open(path)?; + let mut buffer = Vec::new(); + // read the whole file + f.read_to_end(&mut buffer)?; + Ok(buffer) +} +fn read_file(path: &str) -> io::Result { + let content = std::fs::read_to_string(path)?; + Ok(content) +} +fn default_config_pasetoken_string() -> String { + String::from("") +} +fn default_config_pasetoken_footer() -> Footer { + Footer::new() +} +fn serialize_config_pasetoken_footer(_f: &Footer, serializer: S) -> Result +where S: Serializer { + //let buf = String::deserialize(deserializer)?; + let res = serializer.serialize_str("")?; + Ok(res) +} +fn deserialize_config_pasetoken_footer<'de, D>(deserializer: D) -> Result +where D: Deserializer<'de> { + let _buf = String::deserialize(deserializer)?; + Ok(Footer::new()) +} +/// Struct to collect settings for PaSeToken, `footer` will be loaded from `new` call +/// From `serde` use `from_content` with content-file it will collect settings and load `footer` +/// To create a `PaSeToken` object use `pasetoken` +#[derive(Clone, Serialize, Debug,Deserialize, Default)] +pub struct ConfigPaSeToken { + pub public_path: String, + #[serde(default = "default_config_pasetoken_string")] + pub public_data: String, + pub secret_path: String, + #[serde(default = "default_config_pasetoken_string")] + pub secret_data: String, + pub is_bin: bool, + pub assert_val: String, + pub map_footer: HashMap::, + #[serde(default = "default_config_pasetoken_footer", + deserialize_with = "deserialize_config_pasetoken_footer", + serialize_with = "serialize_config_pasetoken_footer" + )] + pub footer: Footer, + pub data: HashMap::, + pub expire: bool, +} +#[allow(unused)] +impl ConfigPaSeToken { + pub fn new( + public_path: String, + secret_path: String, + is_bin: bool, + assert_val: String, + map_footer: HashMap::, + data: HashMap::, + expire: bool, + ) -> Self { + Self { + public_path: public_path.to_owned(), + public_data: String::from(""), + secret_path: secret_path.to_owned(), + secret_data: String::from(""), + is_bin, + assert_val: assert_val.to_owned(), + map_footer: map_footer.to_owned(), + data: data.to_owned(), + footer: Self::make_footer(map_footer.to_owned()).unwrap_or(Footer::new()), + expire, + } + } + pub fn load_data(&self) -> (String,String){ + ( + read_file(&self.public_path).unwrap_or(String::from("")), + read_file(&self.secret_path).unwrap_or(String::from("")), + ) + } + pub fn pasetoken(&self) -> BxDynResult { + Ok(PaSeToken::new(self, &self.assert_val,&self.footer)?) + } + pub fn make_footer(map_footer: HashMap) -> BxDynResult