AI-Studio/runtime/src/api_token.rs

53 lines
1.6 KiB
Rust
Raw Normal View History

use log::error;
use rand::rngs::SysRng;
use rand::{Rng, SeedableRng};
use rand_chacha::ChaChaRng;
2024-11-05 20:39:21 +00:00
/// The API token data structure used to authenticate requests.
pub struct APIToken {
hex_text: String,
}
impl APIToken {
/// Creates a new API token from a byte vector.
fn from_bytes(bytes: Vec<u8>) -> Self {
APIToken {
hex_text: bytes.iter().fold(String::new(), |mut result, byte| {
result.push_str(&format!("{:02x}", byte));
result
}),
}
}
/// Creates a new API token from a hexadecimal text.
pub fn from_hex_text(hex_text: &str) -> Self {
2024-11-05 20:39:21 +00:00
APIToken {
hex_text: hex_text.to_string(),
}
}
pub(crate) fn to_hex_text(&self) -> &str {
self.hex_text.as_str()
}
/// Validates the received token against the valid token.
pub fn validate(&self, received_token: &Self) -> bool {
2024-11-05 20:39:21 +00:00
received_token.to_hex_text() == self.to_hex_text()
}
}
pub fn generate_api_token() -> APIToken {
let mut token = [0u8; 32];
// The API token authenticates privileged runtime requests. If the OS-backed
// RNG cannot provide a secure seed, we abort instead of using a weaker RNG
// because a predictable token would silently break the app's security model.
let mut sys_rng = SysRng;
let mut rng = ChaChaRng::try_from_rng(&mut sys_rng)
.unwrap_or_else(|e| {
error!(Source = "API Token"; "Failed to seed ChaChaRng from SysRng: {e}");
panic!("Failed to seed ChaChaRng from SysRng: {e}");
});
rng.fill_bytes(&mut token);
APIToken::from_bytes(token.to_vec())
2024-11-05 20:39:21 +00:00
}