1use xso::{text::Base64, AsXml, FromXml};
8
9use crate::ns;
10use alloc::collections::BTreeMap;
11
12generate_attribute!(
13 Mechanism, "mechanism", {
15 Plain => "PLAIN",
18
19 ScramSha1 => "SCRAM-SHA-1",
25
26 ScramSha1Plus => "SCRAM-SHA-1-PLUS",
29
30 ScramSha256 => "SCRAM-SHA-256",
33
34 ScramSha256Plus => "SCRAM-SHA-256-PLUS",
37
38 Anonymous => "ANONYMOUS",
41 }
42);
43
44#[derive(FromXml, AsXml, PartialEq, Debug, Clone)]
47#[xml(namespace = ns::SASL, name = "auth")]
48pub struct Auth {
49 #[xml(attribute)]
51 pub mechanism: Mechanism,
52
53 #[xml(text = Base64)]
55 pub data: Vec<u8>,
56}
57
58#[derive(FromXml, AsXml, PartialEq, Debug, Clone)]
62#[xml(namespace = ns::SASL, name = "challenge")]
63pub struct Challenge {
64 #[xml(text = Base64)]
66 pub data: Vec<u8>,
67}
68
69#[derive(FromXml, AsXml, PartialEq, Debug, Clone)]
73#[xml(namespace = ns::SASL, name = "response")]
74pub struct Response {
75 #[xml(text = Base64)]
77 pub data: Vec<u8>,
78}
79
80#[derive(FromXml, AsXml, PartialEq, Debug, Clone)]
83#[xml(namespace = ns::SASL, name = "abort")]
84pub struct Abort;
85
86#[derive(FromXml, AsXml, PartialEq, Debug, Clone)]
88#[xml(namespace = ns::SASL, name = "success")]
89pub struct Success {
90 #[xml(text = Base64)]
92 pub data: Vec<u8>,
93}
94
95#[derive(FromXml, AsXml, PartialEq, Debug, Clone)]
97#[xml(namespace = ns::SASL)]
98pub enum DefinedCondition {
99 #[xml(name = "aborted")]
102 Aborted,
103
104 #[xml(name = "account-disabled")]
107 AccountDisabled,
108
109 #[xml(name = "credentials-expired")]
111 CredentialsExpired,
112
113 #[xml(name = "encryption-required")]
116 EncryptionRequired,
117
118 #[xml(name = "incorrect-encoding")]
120 IncorrectEncoding,
121
122 #[xml(name = "invalid-authzid")]
124 InvalidAuthzid,
125
126 #[xml(name = "invalid-mechanism")]
128 InvalidMechanism,
129
130 #[xml(name = "malformed-request")]
132 MalformedRequest,
133
134 #[xml(name = "mechanism-too-weak")]
136 MechanismTooWeak,
137
138 #[xml(name = "not-authorized")]
140 NotAuthorized,
141
142 #[xml(name = "temporary-auth-failure")]
145 TemporaryAuthFailure,
146}
147
148type Lang = String;
149
150#[derive(FromXml, AsXml, Debug, Clone)]
152#[xml(namespace = ns::SASL, name = "failure")]
153pub struct Failure {
154 #[xml(child)]
156 pub defined_condition: DefinedCondition,
157
158 #[xml(extract(n = .., name = "text", fields(
160 attribute(type_ = String, name = "xml:lang", default),
161 text(type_ = String),
162 )))]
163 pub texts: BTreeMap<Lang, String>,
164}
165
166#[derive(FromXml, AsXml, Debug, Clone)]
168#[xml()]
169pub enum Nonza {
170 #[xml(transparent)]
172 Abort(Abort),
173
174 #[xml(transparent)]
176 Failure(Failure),
177
178 #[xml(transparent)]
180 Success(Success),
181
182 #[xml(transparent)]
184 Auth(Auth),
185
186 #[xml(transparent)]
188 Challenge(Challenge),
189
190 #[xml(transparent)]
192 Response(Response),
193}
194
195#[cfg(test)]
196mod tests {
197 use super::*;
198
199 use minidom::Element;
200
201 #[cfg(target_pointer_width = "32")]
202 #[test]
203 fn test_size() {
204 assert_size!(Mechanism, 1);
205 assert_size!(Auth, 16);
206 assert_size!(Challenge, 12);
207 assert_size!(Response, 12);
208 assert_size!(Abort, 0);
209 assert_size!(Success, 12);
210 assert_size!(DefinedCondition, 1);
211 assert_size!(Failure, 16);
212 }
213
214 #[cfg(target_pointer_width = "64")]
215 #[test]
216 fn test_size() {
217 assert_size!(Mechanism, 1);
218 assert_size!(Auth, 32);
219 assert_size!(Challenge, 24);
220 assert_size!(Response, 24);
221 assert_size!(Abort, 0);
222 assert_size!(Success, 24);
223 assert_size!(DefinedCondition, 1);
224 assert_size!(Failure, 32);
225 }
226
227 #[test]
228 fn test_simple() {
229 let elem: Element = "<auth xmlns='urn:ietf:params:xml:ns:xmpp-sasl' mechanism='PLAIN'/>"
230 .parse()
231 .unwrap();
232 let auth = Auth::try_from(elem).unwrap();
233 assert_eq!(auth.mechanism, Mechanism::Plain);
234 assert!(auth.data.is_empty());
235 }
236
237 #[test]
238 fn section_6_5_1() {
239 let elem: Element =
240 "<failure xmlns='urn:ietf:params:xml:ns:xmpp-sasl'><aborted/></failure>"
241 .parse()
242 .unwrap();
243 let failure = Failure::try_from(elem).unwrap();
244 assert_eq!(failure.defined_condition, DefinedCondition::Aborted);
245 assert!(failure.texts.is_empty());
246 }
247
248 #[test]
249 fn section_6_5_2() {
250 let elem: Element = "<failure xmlns='urn:ietf:params:xml:ns:xmpp-sasl'>
251 <account-disabled/>
252 <text xml:lang='en'>Call 212-555-1212 for assistance.</text>
253 </failure>"
254 .parse()
255 .unwrap();
256 let failure = Failure::try_from(elem).unwrap();
257 assert_eq!(failure.defined_condition, DefinedCondition::AccountDisabled);
258 assert_eq!(
259 failure.texts["en"],
260 String::from("Call 212-555-1212 for assistance.")
261 );
262 }
263
264 #[cfg(feature = "disable-validation")]
267 #[test]
268 fn invalid_failure_with_non_prefixed_text_lang() {
269 let elem: Element = "<failure xmlns='urn:ietf:params:xml:ns:xmpp-sasl'>
270 <not-authorized xmlns='urn:ietf:params:xml:ns:xmpp-sasl'/>
271 <text xmlns='urn:ietf:params:xml:ns:xmpp-sasl' lang='en'>Invalid username or password</text>
272 </failure>"
273 .parse()
274 .unwrap();
275 let failure = Failure::try_from(elem).unwrap();
276 assert_eq!(failure.defined_condition, DefinedCondition::NotAuthorized);
277 assert_eq!(
278 failure.texts[""],
279 String::from("Invalid username or password")
280 );
281 }
282}