| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990 |
- package mtglib
-
- import (
- "crypto/rand"
- "encoding/base64"
- "encoding/hex"
- "fmt"
- "strings"
- )
-
- const SecretKeyLength = 16
-
- type Secret struct {
- Key []byte
- Host string
- }
-
- func (s Secret) MarshalText() ([]byte, error) {
- if s.Key == nil {
- return nil, nil
- }
-
- return []byte(s.String()), nil
- }
-
- func (s *Secret) UnmarshalText(data []byte) error {
- text := string(data)
-
- if text == "" {
- return ErrSecretEmpty
- }
-
- var (
- decoded []byte
- err error
- )
-
- if strings.HasPrefix(text, "ee") {
- decoded, err = hex.DecodeString(strings.TrimPrefix(text, "ee"))
- }
-
- if err != nil || len(decoded) <= SecretKeyLength {
- decoded, err = base64.RawURLEncoding.DecodeString(text)
- }
-
- if err != nil {
- return fmt.Errorf("incorrect secret format: %w", err)
- }
-
- if len(decoded) <= SecretKeyLength {
- return fmt.Errorf("secret has incorrect length %d", len(text))
- }
-
- s.Key = decoded[:SecretKeyLength]
- s.Host = string(decoded[SecretKeyLength:])
-
- return nil
- }
-
- func (s Secret) String() string {
- return s.Base64()
- }
-
- func (s Secret) Base64() string {
- return base64.RawURLEncoding.EncodeToString(s.makeBytes())
- }
-
- func (s Secret) Hex() string {
- return hex.EncodeToString(s.makeBytes())
- }
-
- func (s *Secret) makeBytes() []byte {
- data := append([]byte{238}, s.Key...) // hex 'ee' = 238
- data = append(data, s.Host...)
-
- return data
- }
-
- func GenerateSecret(hostname string) Secret {
- s := Secret{
- Key: make([]byte, SecretKeyLength),
- Host: hostname,
- }
-
- if _, err := rand.Read(s.Key); err != nil {
- panic(err)
- }
-
- return s
- }
|