2020-01-01 20:17:43 +00:00
|
|
|
use authc::{AuthClient, AuthToken, Uuid};
|
2020-01-07 06:27:18 +00:00
|
|
|
use common::msg::RegisterError;
|
2019-08-11 19:48:02 +00:00
|
|
|
use hashbrown::HashMap;
|
2019-12-21 17:02:39 +00:00
|
|
|
use std::str::FromStr;
|
2019-08-08 22:24:14 +00:00
|
|
|
|
2020-01-01 20:17:43 +00:00
|
|
|
fn derive_uuid(username: &str) -> Uuid {
|
|
|
|
let mut state: [u8; 16] = [
|
|
|
|
52, 17, 19, 239, 52, 17, 19, 239, 52, 17, 19, 239, 52, 17, 19, 239,
|
|
|
|
];
|
|
|
|
for mix_byte_1 in username.as_bytes() {
|
|
|
|
for i in 0..16 {
|
|
|
|
let mix_byte_step: u8 = mix_byte_1
|
|
|
|
.wrapping_pow(239)
|
|
|
|
.wrapping_mul((i as u8).wrapping_pow(43));
|
|
|
|
let mix_byte_2 = state[i + mix_byte_step as usize % 16];
|
|
|
|
let rot_step: u8 = mix_byte_1
|
|
|
|
.wrapping_pow(29)
|
|
|
|
.wrapping_mul((i as u8).wrapping_pow(163));
|
|
|
|
state[i] = (state[i] ^ mix_byte_1)
|
|
|
|
.wrapping_mul(mix_byte_2)
|
|
|
|
.rotate_left(rot_step as u32);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
Uuid::from_slice(&state).unwrap()
|
|
|
|
}
|
|
|
|
|
2019-08-08 22:24:14 +00:00
|
|
|
pub struct AuthProvider {
|
2020-01-02 08:43:45 +00:00
|
|
|
accounts: HashMap<Uuid, String>,
|
2019-12-21 17:02:39 +00:00
|
|
|
auth_server: Option<AuthClient>,
|
2019-08-08 22:24:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
impl AuthProvider {
|
2019-12-21 17:02:39 +00:00
|
|
|
pub fn new(auth_addr: Option<String>) -> Self {
|
|
|
|
let auth_server = match auth_addr {
|
|
|
|
Some(addr) => Some(AuthClient::new(addr)),
|
|
|
|
None => None,
|
|
|
|
};
|
|
|
|
|
2019-08-08 22:24:14 +00:00
|
|
|
AuthProvider {
|
|
|
|
accounts: HashMap::new(),
|
2019-12-21 17:02:39 +00:00
|
|
|
auth_server,
|
2019-08-08 22:24:14 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-01-07 06:27:18 +00:00
|
|
|
pub fn query(&mut self, username_or_token: String) -> Result<(), RegisterError> {
|
2019-12-21 17:02:39 +00:00
|
|
|
// Based on whether auth server is provided or not we expect an username or
|
|
|
|
// token
|
|
|
|
match &self.auth_server {
|
|
|
|
// Token from auth server expected
|
|
|
|
Some(srv) => {
|
|
|
|
log::info!("Validating '{}' token.", &username_or_token);
|
2020-01-07 06:27:18 +00:00
|
|
|
// Parse token
|
|
|
|
let token = AuthToken::from_str(&username_or_token)
|
|
|
|
.map_err(|e| RegisterError::AuthError(e.to_string()))?;
|
|
|
|
// Validate token
|
|
|
|
let uuid = srv.validate(token)?;
|
|
|
|
// Check if already logged in
|
|
|
|
if self.accounts.contains_key(&uuid) {
|
|
|
|
return Err(RegisterError::AlreadyLoggedIn);
|
2019-12-21 17:02:39 +00:00
|
|
|
}
|
2020-01-07 06:27:18 +00:00
|
|
|
// Log in
|
|
|
|
let username = srv.uuid_to_username(uuid.clone())?;
|
|
|
|
self.accounts.insert(uuid, username);
|
|
|
|
Ok(())
|
2019-12-21 17:02:39 +00:00
|
|
|
},
|
|
|
|
// Username is expected
|
|
|
|
None => {
|
2020-01-02 08:43:45 +00:00
|
|
|
// Assume username was provided
|
|
|
|
let username = username_or_token;
|
|
|
|
let uuid = derive_uuid(&username);
|
|
|
|
if !self.accounts.contains_key(&uuid) {
|
|
|
|
log::info!("New User '{}'", username);
|
|
|
|
self.accounts.insert(uuid, username);
|
2020-01-07 06:27:18 +00:00
|
|
|
Ok(())
|
2019-12-21 17:02:39 +00:00
|
|
|
} else {
|
2020-01-07 06:27:18 +00:00
|
|
|
Err(RegisterError::AlreadyLoggedIn)
|
2019-12-21 17:02:39 +00:00
|
|
|
}
|
|
|
|
},
|
2019-08-08 22:24:14 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|