1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
|
/*
This file is part of jellything (https://codeberg.org/metamuffin/jellything)
which is licensed under the GNU Affero General Public License (version 3); see /COPYING.
Copyright (C) 2025 metamuffin <metamuffin.org>
*/
use crate::CONF;
use aes_gcm_siv::{
aead::{generic_array::GenericArray, Aead},
Aes256GcmSiv, KeyInit,
};
use anyhow::{anyhow, bail, Context};
use base64::Engine;
use bincode::{Decode, Encode};
use jellycache::CachePath;
use jellycommon::{Asset, LocalTrack};
use log::warn;
use serde::Serialize;
use std::{path::PathBuf, sync::LazyLock};
const VERSION: u32 = 3;
static ASSET_KEY: LazyLock<Aes256GcmSiv> = LazyLock::new(|| {
if let Some(sk) = &CONF.asset_key {
let r = base64::engine::general_purpose::STANDARD
.decode(sk)
.expect("key invalid; should be valid base64");
aes_gcm_siv::Aes256GcmSiv::new_from_slice(&r)
.expect("key has the wrong length; should be 32 bytes")
} else {
warn!("session_key not configured; generating a random one.");
aes_gcm_siv::Aes256GcmSiv::new_from_slice(&[(); 32].map(|_| rand::random())).unwrap()
}
});
#[derive(Debug, Encode, Decode, Serialize)]
pub enum AssetInner {
Federated { host: String, asset: Vec<u8> },
Cache(CachePath),
Assets(PathBuf),
Media(PathBuf),
LocalTrack(LocalTrack),
}
impl AssetInner {
pub fn ser(&self) -> Asset {
let mut plaintext = Vec::new();
plaintext.extend(u32::to_le_bytes(VERSION));
plaintext.extend(bincode::encode_to_vec(self, bincode::config::standard()).unwrap());
while plaintext.len() % 16 == 0 {
plaintext.push(0);
}
let nonce = [(); 12].map(|_| rand::random());
let mut ciphertext = ASSET_KEY
.encrypt(&GenericArray::from(nonce), plaintext.as_slice())
.unwrap();
ciphertext.extend(nonce);
Asset(base64::engine::general_purpose::URL_SAFE.encode(&ciphertext))
}
pub fn deser(s: &str) -> anyhow::Result<Self> {
let ciphertext = base64::engine::general_purpose::URL_SAFE.decode(s)?;
let (ciphertext, nonce) = ciphertext.split_at(ciphertext.len() - 12);
let plaintext = ASSET_KEY
.decrypt(nonce.into(), ciphertext)
.map_err(|_| anyhow!("asset token decrypt failed"))?;
let version = u32::from_le_bytes(plaintext[0..4].try_into().unwrap());
if version != VERSION {
bail!("asset token version mismatch");
}
let (data, _): (AssetInner, _) =
bincode::decode_from_slice(&plaintext[4..], bincode::config::standard())
.context("asset token has invalid format")?;
Ok(data)
}
/// Returns `true` if the asset inner is [`Federated`].
///
/// [`Federated`]: AssetInner::Federated
#[must_use]
pub fn is_federated(&self) -> bool {
matches!(self, Self::Federated { .. })
}
}
|