aboutsummaryrefslogtreecommitdiff
path: root/logic/src/session.rs
blob: bc7f1373b1b12b55d76964b2e15e9db75d291d92 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
/*
    This file is part of jellything (https://codeberg.org/metamuffin/jellything)
    which is licensed under the GNU Affero General Public License (version 3); see /COPYING.
    Copyright (C) 2025 metamuffin <metamuffin.org>
*/
use aes_gcm_siv::{
    KeyInit,
    aead::{Aead, generic_array::GenericArray},
};
use anyhow::anyhow;
use base64::Engine;
use jellybase::SECRETS;
use jellycommon::{
    chrono::{DateTime, Utc},
    user::{PermissionSet, User},
};
use log::warn;
use serde::{Deserialize, Serialize};
use std::{sync::LazyLock, time::Duration};

pub struct Session {
    pub user: User,
}

pub struct AdminSession(pub Session);

#[derive(Debug, Clone, Serialize, Deserialize)]
pub struct SessionData {
    username: String,
    expire: DateTime<Utc>,
    permissions: PermissionSet,
}

static SESSION_KEY: LazyLock<[u8; 32]> = LazyLock::new(|| {
    if let Some(sk) = &SECRETS.session_key {
        let r = base64::engine::general_purpose::STANDARD
            .decode(sk)
            .expect("key invalid; should be valid base64");
        r.try_into()
            .expect("key has the wrong length; should be 32 bytes")
    } else {
        warn!("session_key not configured; generating a random one.");
        [(); 32].map(|_| rand::random())
    }
});

pub fn create(username: String, permissions: PermissionSet, expire: Duration) -> String {
    let session_data = SessionData {
        expire: Utc::now() + expire,
        username: username.to_owned(),
        permissions,
    };
    let mut plaintext =
        bincode::serde::encode_to_vec(&session_data, bincode::config::standard()).unwrap();

    while plaintext.len() % 16 == 0 {
        plaintext.push(0);
    }

    let cipher = aes_gcm_siv::Aes256GcmSiv::new_from_slice(&*SESSION_KEY).unwrap();
    let nonce = [(); 12].map(|_| rand::random());
    let mut ciphertext = cipher
        .encrypt(&GenericArray::from(nonce), plaintext.as_slice())
        .unwrap();
    ciphertext.extend(nonce);

    base64::engine::general_purpose::URL_SAFE.encode(&ciphertext)
}

pub fn validate(token: &str) -> anyhow::Result<String> {
    let ciphertext = base64::engine::general_purpose::URL_SAFE.decode(token)?;
    let cipher = aes_gcm_siv::Aes256GcmSiv::new_from_slice(&*SESSION_KEY).unwrap();
    let (ciphertext, nonce) = ciphertext.split_at(ciphertext.len() - 12);
    let plaintext = cipher
        .decrypt(nonce.into(), ciphertext)
        .map_err(|e| anyhow!("decryption failed: {e:?}"))?;

    let (session_data, _): (SessionData, _) =
        bincode::serde::decode_from_slice(&plaintext, bincode::config::standard())?;

    if session_data.expire < Utc::now() {
        Err(anyhow!("session expired"))?
    }

    Ok(session_data.username)
}

#[test]
fn test() {
    jellybase::use_test_config();
    let tok = create(
        "blub".to_string(),
        jellycommon::user::PermissionSet::default(),
        Duration::from_days(1),
    );
    validate(&tok).unwrap();
}

#[test]
fn test_crypto() {
    jellybase::use_test_config();
    let nonce = [(); 12].map(|_| rand::random());
    let cipher = aes_gcm_siv::Aes256GcmSiv::new_from_slice(&*SESSION_KEY).unwrap();
    let plaintext = b"testing stuff---";
    let ciphertext = cipher
        .encrypt(&GenericArray::from(nonce), plaintext.as_slice())
        .unwrap();
    let plaintext2 = cipher
        .decrypt((&nonce).into(), ciphertext.as_slice())
        .unwrap();
    assert_eq!(plaintext, plaintext2.as_slice());
}