aboutsummaryrefslogtreecommitdiff
path: root/src/model.rs
blob: ed4fbf8663223480b08923c20be92e7ceaea4634 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
use base64::{engine::general_purpose::URL_SAFE, Engine as _};
use chrono::{DateTime, Local, NaiveDateTime, TimeZone};
use rand_core::{OsRng, RngCore};

#[derive(Debug, Clone, PartialEq, Eq)]
pub struct File {
    pub id: String,
    pub name: String,
    pub expires_at: DateTime<Local>,
    pub content_length: usize,
}

pub fn local_time() -> DateTime<Local> {
    let dt = Local::now();
    match decode_datetime(&encode_datetime(dt)) {
        Some(res) => res,
        None => dt,
    }
}

// Using 20 bytes (160 bits) to file identifiers
// https://owasp.org/www-community/vulnerabilities/Insufficient_Session-ID_Length
// https://www.rfc-editor.org/rfc/rfc6749.html#section-10.10
const FILE_ID_BYTES: usize = 20;

pub fn generate_file_id() -> String {
    let mut token = [0u8; FILE_ID_BYTES];
    OsRng.fill_bytes(&mut token);
    URL_SAFE.encode(token)
}

const FORMAT: &str = "%Y-%m-%d %H:%M:%S";

pub fn encode_datetime(dt: DateTime<Local>) -> String {
    dt.naive_utc().format(FORMAT).to_string()
}

pub fn decode_datetime(str: &str) -> Option<DateTime<Local>> {
    let naive_time = NaiveDateTime::parse_from_str(str, FORMAT).ok()?;
    Some(Local.from_utc_datetime(&naive_time))
}

#[cfg(test)]
mod tests {
    use super::*;

    #[test]
    fn test_datetime_serialization() {
        let dt = local_time();
        assert_eq!(decode_datetime(&encode_datetime(dt)), Some(dt))
    }
}