refactor(types,register): introduce IdUrl and related types into submod

- `IdUrl` does basic validation for identity URL. Server could enforce
  additional restrictions on their own need.

- single-label doamins are now rejected by default.

- More tests are added for `IdUrl` validation.
This commit is contained in:
oxalica 2024-09-19 01:41:02 -04:00
parent 25936cc4f7
commit fac380fe55
7 changed files with 262 additions and 81 deletions

View file

@ -16,6 +16,7 @@ serde = { version = "1", features = ["derive"] }
serde_jcs = "0.1"
serde_json = "1"
serde_with = "3.9.0"
thiserror = "1.0.63"
url = { version = "2", features = ["serde"] }
[dev-dependencies]

184
blah-types/src/identity.rs Normal file
View file

@ -0,0 +1,184 @@
use core::fmt;
use std::ops;
use std::str::FromStr;
use serde::{Deserialize, Serialize};
use thiserror::Error;
use url::{Host, Position, Url};
use crate::{PubKey, Signed};
/// User identity description structure.
// TODO: Revise and shrink duplicates (pubkey fields).
#[derive(Debug, Clone, PartialEq, Eq, Serialize, Deserialize)]
pub struct UserIdentityDesc {
/// User primary identity key, only for signing action keys.
pub id_key: PubKey,
/// User action subkeys, signed by the identity key.
pub act_keys: Vec<Signed<UserActKeyDesc>>,
/// User profile, signed by any valid action key.
pub profile: Signed<UserProfile>,
}
impl UserIdentityDesc {
pub const WELL_KNOWN_PATH: &str = "/.well-known/blah/identity.json";
}
// TODO: JWS or alike?
#[derive(Debug, Clone, PartialEq, Eq, Serialize, Deserialize)]
#[serde(tag = "typ", rename = "user_act_key")]
pub struct UserActKeyDesc {
pub act_key: PubKey,
pub expire_time: u64,
pub comment: String,
}
#[derive(Debug, Clone, PartialEq, Eq, Serialize, Deserialize)]
#[serde(tag = "typ", rename = "user_profile")]
pub struct UserProfile {
pub preferred_chat_server_urls: Vec<Url>,
pub id_urls: Vec<IdUrl>,
}
#[derive(Debug, Clone, PartialEq, Eq, Deserialize)]
#[serde(try_from = "Url")]
pub struct IdUrl(Url);
impl fmt::Display for IdUrl {
fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
self.0.fmt(f)
}
}
impl Serialize for IdUrl {
fn serialize<S>(&self, ser: S) -> Result<S::Ok, S::Error>
where
S: serde::Serializer,
{
self.0.serialize(ser)
}
}
impl IdUrl {
/// Max domain length is limited by TLS certificate CommonName `ub-common-name`,
/// which is 64. Adding the schema and port, it should still be below 80.
///
/// Ref: <https://www.rfc-editor.org/rfc/rfc3280>
pub const MAX_LEN: usize = 80;
}
impl ops::Deref for IdUrl {
type Target = Url;
fn deref(&self) -> &Self::Target {
&self.0
}
}
#[derive(Debug, Clone, PartialEq, Eq, Error)]
#[non_exhaustive]
pub enum IdUrlError {
#[error(transparent)]
ParseUrl(#[from] url::ParseError),
#[error("id-URL too long")]
TooLong,
#[error("id-URL scheme must be https or http")]
InvalidScheme,
#[error("id-URL must not have username or password")]
HasAuth,
#[error("id-URL host must not be an IP")]
InvalidHost,
#[error("id-URL must has root path `/` without query or fragment")]
InvalidPath,
}
impl TryFrom<Url> for IdUrl {
type Error = IdUrlError;
/// Validate identity URL.
///
/// We only accept simple HTTPS (and HTTP, if configured) domains. It must not be an IP host
/// and must not have other parts like username, query, and etc.
fn try_from(url: Url) -> Result<Self, Self::Error> {
// ```text
// url =
// scheme ":"
// [ "//" [ username [ ":" password ]? "@" ]? host [ ":" port ]? ]?
// path [ "?" query ]? [ "#" fragment ]?
// ```
if url.as_str().len() > Self::MAX_LEN {
return Err(IdUrlError::TooLong);
}
if !["https", "http"].contains(&url.scheme()) {
return Err(IdUrlError::InvalidScheme);
}
if &url[Position::AfterScheme..Position::BeforeHost] != "://" {
return Err(IdUrlError::HasAuth);
}
if !url
.host()
.is_some_and(|host| matches!(host, Host::Domain(_)))
{
return Err(IdUrlError::InvalidHost);
}
if &url[Position::BeforePath..] != "/" {
return Err(IdUrlError::InvalidPath);
}
Ok(Self(url))
}
}
impl FromStr for IdUrl {
type Err = IdUrlError;
fn from_str(s: &str) -> Result<Self, Self::Err> {
Url::parse(s)?.try_into()
}
}
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn parse_id_url() {
let parse = <str>::parse::<IdUrl>;
assert!(matches!(
parse("not-a-url").unwrap_err(),
IdUrlError::ParseUrl(_)
));
macro_rules! check_err {
($($s:expr, $err:expr;)*) => {
$(
assert_eq!(parse(&$s), Err($err));
)*
};
}
check_err! {
format!("https://{}.com/", "a".repeat(IdUrl::MAX_LEN)), IdUrlError::TooLong;
"file:///etc/passwd", IdUrlError::InvalidScheme;
"https://user@example.com/", IdUrlError::HasAuth;
"https://user:passwd@example.com/", IdUrlError::HasAuth;
"https://:passwd@example.com/", IdUrlError::HasAuth;
"https://[::1]/", IdUrlError::InvalidHost;
"https://127.0.0.1/", IdUrlError::InvalidHost;
"https://example.com/path", IdUrlError::InvalidPath;
"https://example.com//", IdUrlError::InvalidPath;
"https://example.com/?query", IdUrlError::InvalidPath;
"https://example.com/#hash", IdUrlError::InvalidPath;
"https://example.com?query", IdUrlError::InvalidPath;
"https://example.com#hash", IdUrlError::InvalidPath;
}
// Auto normalized.
let expect = parse("https://example.com/").unwrap();
assert_eq!(parse("https://example.com").unwrap(), expect);
assert_eq!(parse("https://:@example.com").unwrap(), expect);
}
}

View file

@ -7,6 +7,7 @@ use ed25519_dalek::{
Signature, SignatureError, Signer, SigningKey, VerifyingKey, PUBLIC_KEY_LENGTH,
SIGNATURE_LENGTH,
};
use identity::IdUrl;
use rand_core::RngCore;
use serde::{de, Deserialize, Deserializer, Serialize, Serializer};
use serde_with::{serde_as, DisplayFromStr};
@ -15,42 +16,13 @@ use url::Url;
// Re-export of public dependencies.
pub use bitflags;
pub use ed25519_dalek;
pub use url;
pub mod identity;
pub const X_BLAH_NONCE: &str = "x-blah-nonce";
pub const X_BLAH_DIFFICULTY: &str = "x-blah-difficulty";
/// User identity description structure.
// TODO: Revise and shrink duplicates (pubkey fields).
#[derive(Debug, Clone, PartialEq, Eq, Serialize, Deserialize)]
pub struct UserIdentityDesc {
/// User primary identity key, only for signing action keys.
pub id_key: PubKey,
/// User action subkeys, signed by the identity key.
pub act_keys: Vec<Signed<UserActKeyDesc>>,
/// User profile, signed by any valid action key.
pub profile: Signed<UserProfile>,
}
impl UserIdentityDesc {
pub const WELL_KNOWN_PATH: &str = "/.well-known/blah/identity.json";
}
// TODO: JWS or alike?
#[derive(Debug, Clone, PartialEq, Eq, Serialize, Deserialize)]
#[serde(tag = "typ", rename = "user_act_key")]
pub struct UserActKeyDesc {
pub act_key: PubKey,
pub expire_time: u64,
pub comment: String,
}
#[derive(Debug, Clone, PartialEq, Eq, Serialize, Deserialize)]
#[serde(tag = "typ", rename = "user_profile")]
pub struct UserProfile {
pub preferred_chat_server_urls: Vec<Url>,
pub id_urls: Vec<Url>,
}
/// An opaque server-specific ID for rooms, messages, and etc.
/// It's currently serialized as a string for JavaScript's convenience.
#[serde_as]
@ -177,7 +149,7 @@ impl<T: Serialize> Signed<T> {
#[serde(tag = "typ", rename = "user_register")]
pub struct UserRegisterPayload {
pub server_url: Url,
pub id_url: Url,
pub id_url: IdUrl,
pub id_key: PubKey,
pub challenge_nonce: u32,
}