akkoma/lib/pleroma/web/http_signatures/http_signatures.ex

49 lines
1.4 KiB
Elixir
Raw Normal View History

2017-09-18 09:39:57 +00:00
# https://tools.ietf.org/html/draft-cavage-http-signatures-08
defmodule Pleroma.Web.HTTPSignatures do
alias Pleroma.User
2017-09-18 09:39:57 +00:00
def split_signature(sig) do
default = %{"headers" => "date"}
2017-09-18 09:39:57 +00:00
sig = sig
2017-09-18 09:39:57 +00:00
|> String.trim()
|> String.split(",")
|> Enum.reduce(default, fn(part, acc) ->
[key | rest] = String.split(part, "=")
value = Enum.join(rest, "=")
Map.put(acc, key, String.trim(value, "\""))
end)
Map.put(sig, "headers", String.split(sig["headers"], ~r/\s/))
2017-09-18 09:39:57 +00:00
end
def validate(headers, signature, public_key) do
sigstring = build_signing_string(headers, signature["headers"])
{:ok, sig} = Base.decode64(signature["signature"])
:public_key.verify(sigstring, :sha256, sig, public_key)
end
def validate_conn(conn) do
# TODO: How to get the right key and see if it is actually valid for that request.
# For now, fetch the key for the actor.
with actor_id <- conn.params["actor"],
{:ok, public_key} <- User.get_public_key_for_ap_id(actor_id) do
validate_conn(conn, public_key)
else
_ -> false
end
2017-09-18 09:39:57 +00:00
end
2017-12-11 09:37:40 +00:00
def validate_conn(conn, public_key) do
headers = Enum.into(conn.req_headers, %{})
signature = split_signature(headers["signature"])
validate(headers, signature, public_key)
end
2017-09-18 09:39:57 +00:00
def build_signing_string(headers, used_headers) do
used_headers
|> Enum.map(fn (header) -> "#{header}: #{headers[header]}" end)
|> Enum.join("\n")
end
end