@@ -57,7 +57,7 @@ pub struct LnurlAuthJwt {
57
57
url : String ,
58
58
default_headers : HashMap < String , String > ,
59
59
client : reqwest:: Client ,
60
- jwt_token : RwLock < Option < JwtToken > > ,
60
+ cached_jwt_token : RwLock < Option < JwtToken > > ,
61
61
}
62
62
63
63
impl LnurlAuthJwt {
@@ -85,7 +85,7 @@ impl LnurlAuthJwt {
85
85
. build ( )
86
86
. map_err ( VssHeaderProviderError :: from) ?;
87
87
88
- Ok ( LnurlAuthJwt { engine, parent_key, url, default_headers, client, jwt_token : RwLock :: new ( None ) } )
88
+ Ok ( LnurlAuthJwt { engine, parent_key, url, default_headers, client, cached_jwt_token : RwLock :: new ( None ) } )
89
89
}
90
90
91
91
async fn fetch_jwt_token ( & self ) -> Result < JwtToken , VssHeaderProviderError > {
@@ -132,14 +132,14 @@ impl LnurlAuthJwt {
132
132
let cached_token_str = if force_refresh {
133
133
None
134
134
} else {
135
- let jwt_token = self . jwt_token . read ( ) . unwrap ( ) ;
135
+ let jwt_token = self . cached_jwt_token . read ( ) . unwrap ( ) ;
136
136
jwt_token. as_ref ( ) . filter ( |t| !t. is_expired ( ) ) . map ( |t| t. token_str . clone ( ) )
137
137
} ;
138
138
if let Some ( token_str) = cached_token_str {
139
139
Ok ( token_str)
140
140
} else {
141
141
let jwt_token = self . fetch_jwt_token ( ) . await ?;
142
- * self . jwt_token . write ( ) . unwrap ( ) = Some ( jwt_token. clone ( ) ) ;
142
+ * self . cached_jwt_token . write ( ) . unwrap ( ) = Some ( jwt_token. clone ( ) ) ;
143
143
Ok ( jwt_token. token_str )
144
144
}
145
145
}
@@ -190,23 +190,23 @@ fn sign_lnurl(
190
190
. to_string ( ) ;
191
191
let k1: [ u8 ; 32 ] = FromHex :: from_hex ( & k1_str) . map_err ( |_| invalid_lnurl ( ) ) ?;
192
192
193
- // Sign k1 parameter with linking key.
194
- let hashing_key = hashing_key ( engine, parent_key) ?;
195
- let linking_key_path = linking_key_path ( & hashing_key , domain) ?;
196
- let private_key = parent_key
193
+ // Sign k1 parameter with linking private key.
194
+ let hashing_private_key = hashing_key ( engine, parent_key) ?;
195
+ let linking_key_path = linking_key_path ( & hashing_private_key , domain) ?;
196
+ let linking_private_key = parent_key
197
197
. derive_priv ( engine, & linking_key_path)
198
198
. map_err ( VssHeaderProviderError :: from) ?
199
199
. to_priv ( ) ;
200
- let public_key = private_key . public_key ( engine) ;
200
+ let linking_public_key = linking_private_key . public_key ( engine) ;
201
201
let message = Message :: from_slice ( & k1)
202
202
. map_err ( |_| VssHeaderProviderError :: InvalidData { error : format ! ( "invalid k1: {:?}" , k1) } ) ?;
203
- let sig = engine. sign_ecdsa ( & message, & private_key . inner ) ;
203
+ let sig = engine. sign_ecdsa ( & message, & linking_private_key . inner ) ;
204
204
205
- // Compose LNURL with signature and linking key.
205
+ // Compose LNURL with signature and linking public key.
206
206
lnurl
207
207
. query_pairs_mut ( )
208
208
. append_pair ( SIG_QUERY_PARAM , & sig. serialize_der ( ) . to_string ( ) )
209
- . append_pair ( KEY_QUERY_PARAM , & public_key . to_string ( ) ) ;
209
+ . append_pair ( KEY_QUERY_PARAM , & linking_public_key . to_string ( ) ) ;
210
210
Ok ( lnurl. to_string ( ) )
211
211
}
212
212
0 commit comments