Skip to content

Commit ac4bb96

Browse files
committed
Rename variables
1 parent 65a3abb commit ac4bb96

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

src/headers/lnurl_auth_jwt.rs

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ pub struct LnurlAuthJwt {
5757
url: String,
5858
default_headers: HashMap<String, String>,
5959
client: reqwest::Client,
60-
jwt_token: RwLock<Option<JwtToken>>,
60+
cached_jwt_token: RwLock<Option<JwtToken>>,
6161
}
6262

6363
impl LnurlAuthJwt {
@@ -85,7 +85,7 @@ impl LnurlAuthJwt {
8585
.build()
8686
.map_err(VssHeaderProviderError::from)?;
8787

88-
Ok(LnurlAuthJwt { engine, parent_key, url, default_headers, client, jwt_token: RwLock::new(None) })
88+
Ok(LnurlAuthJwt { engine, parent_key, url, default_headers, client, cached_jwt_token: RwLock::new(None) })
8989
}
9090

9191
async fn fetch_jwt_token(&self) -> Result<JwtToken, VssHeaderProviderError> {
@@ -132,14 +132,14 @@ impl LnurlAuthJwt {
132132
let cached_token_str = if force_refresh {
133133
None
134134
} else {
135-
let jwt_token = self.jwt_token.read().unwrap();
135+
let jwt_token = self.cached_jwt_token.read().unwrap();
136136
jwt_token.as_ref().filter(|t| !t.is_expired()).map(|t| t.token_str.clone())
137137
};
138138
if let Some(token_str) = cached_token_str {
139139
Ok(token_str)
140140
} else {
141141
let jwt_token = self.fetch_jwt_token().await?;
142-
*self.jwt_token.write().unwrap() = Some(jwt_token.clone());
142+
*self.cached_jwt_token.write().unwrap() = Some(jwt_token.clone());
143143
Ok(jwt_token.token_str)
144144
}
145145
}
@@ -190,23 +190,23 @@ fn sign_lnurl(
190190
.to_string();
191191
let k1: [u8; 32] = FromHex::from_hex(&k1_str).map_err(|_| invalid_lnurl())?;
192192

193-
// Sign k1 parameter with linking key.
194-
let hashing_key = hashing_key(engine, parent_key)?;
195-
let linking_key_path = linking_key_path(&hashing_key, domain)?;
196-
let private_key = parent_key
193+
// Sign k1 parameter with linking private key.
194+
let hashing_private_key = hashing_key(engine, parent_key)?;
195+
let linking_key_path = linking_key_path(&hashing_private_key, domain)?;
196+
let linking_private_key = parent_key
197197
.derive_priv(engine, &linking_key_path)
198198
.map_err(VssHeaderProviderError::from)?
199199
.to_priv();
200-
let public_key = private_key.public_key(engine);
200+
let linking_public_key = linking_private_key.public_key(engine);
201201
let message = Message::from_slice(&k1)
202202
.map_err(|_| VssHeaderProviderError::InvalidData { error: format!("invalid k1: {:?}", k1) })?;
203-
let sig = engine.sign_ecdsa(&message, &private_key.inner);
203+
let sig = engine.sign_ecdsa(&message, &linking_private_key.inner);
204204

205-
// Compose LNURL with signature and linking key.
205+
// Compose LNURL with signature and linking public key.
206206
lnurl
207207
.query_pairs_mut()
208208
.append_pair(SIG_QUERY_PARAM, &sig.serialize_der().to_string())
209-
.append_pair(KEY_QUERY_PARAM, &public_key.to_string());
209+
.append_pair(KEY_QUERY_PARAM, &linking_public_key.to_string());
210210
Ok(lnurl.to_string())
211211
}
212212

0 commit comments

Comments
 (0)