2018-12-23 13:04:54 -07:00
|
|
|
# Pleroma: A lightweight social networking server
|
2021-01-12 23:49:20 -07:00
|
|
|
# Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
|
2018-12-23 13:04:54 -07:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2017-12-12 02:17:21 -07:00
|
|
|
defmodule Pleroma.Web.Plugs.HTTPSignaturePlug do
|
|
|
|
import Plug.Conn
|
2022-12-19 13:41:48 -07:00
|
|
|
import Phoenix.Controller, only: [get_format: 1]
|
2023-08-15 04:22:18 -06:00
|
|
|
|
|
|
|
use Pleroma.Web, :verified_routes
|
2022-08-05 13:31:32 -06:00
|
|
|
alias Pleroma.Activity
|
2022-11-26 12:22:56 -07:00
|
|
|
alias Pleroma.Signature
|
|
|
|
alias Pleroma.Instances
|
2018-02-22 06:57:35 -07:00
|
|
|
require Logger
|
2017-12-12 02:17:21 -07:00
|
|
|
|
2022-11-26 12:22:56 -07:00
|
|
|
@cachex Pleroma.Config.get([:cachex, :provider], Cachex)
|
|
|
|
|
2017-12-12 02:17:21 -07:00
|
|
|
def init(options) do
|
|
|
|
options
|
|
|
|
end
|
|
|
|
|
2018-05-04 14:59:01 -06:00
|
|
|
def call(%{assigns: %{valid_signature: true}} = conn, _opts) do
|
2018-02-15 11:58:26 -07:00
|
|
|
conn
|
|
|
|
end
|
|
|
|
|
2018-05-04 14:59:01 -06:00
|
|
|
def call(conn, _opts) do
|
2022-12-19 13:41:48 -07:00
|
|
|
if get_format(conn) in ["json", "activity+json"] do
|
2019-12-19 06:17:18 -07:00
|
|
|
conn
|
|
|
|
|> maybe_assign_valid_signature()
|
|
|
|
|> maybe_require_signature()
|
|
|
|
else
|
|
|
|
conn
|
|
|
|
end
|
2019-12-16 08:24:03 -07:00
|
|
|
end
|
2018-03-11 07:37:23 -06:00
|
|
|
|
2022-08-27 12:05:48 -06:00
|
|
|
def route_aliases(%{path_info: ["objects", id], query_string: query_string}) do
|
2023-08-15 04:22:18 -06:00
|
|
|
ap_id = url(~p[/objects/#{id}])
|
2022-08-05 13:31:32 -06:00
|
|
|
|
|
|
|
with %Activity{} = activity <- Activity.get_by_object_ap_id_with_object(ap_id) do
|
2023-08-15 04:22:18 -06:00
|
|
|
[~p"/notice/#{activity.id}", "/notice/#{activity.id}?#{query_string}"]
|
2022-08-05 13:31:32 -06:00
|
|
|
else
|
|
|
|
_ -> []
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def route_aliases(_), do: []
|
|
|
|
|
2024-06-12 11:40:44 -06:00
|
|
|
def maybe_put_created_psudoheader(conn) do
|
|
|
|
case HTTPSignatures.signature_for_conn(conn) do
|
|
|
|
%{"created" => created} ->
|
|
|
|
put_req_header(conn, "(created)", created)
|
|
|
|
|
|
|
|
_ ->
|
|
|
|
conn
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2024-06-17 15:30:14 -06:00
|
|
|
def maybe_put_expires_psudoheader(conn) do
|
|
|
|
case HTTPSignatures.signature_for_conn(conn) do
|
|
|
|
%{"expires" => expires} ->
|
|
|
|
put_req_header(conn, "(expires)", expires)
|
|
|
|
|
|
|
|
_ ->
|
|
|
|
conn
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-08-05 13:31:32 -06:00
|
|
|
defp assign_valid_signature_on_route_aliases(conn, []), do: conn
|
|
|
|
|
|
|
|
defp assign_valid_signature_on_route_aliases(%{assigns: %{valid_signature: true}} = conn, _),
|
|
|
|
do: conn
|
|
|
|
|
|
|
|
defp assign_valid_signature_on_route_aliases(conn, [path | rest]) do
|
|
|
|
request_target = String.downcase("#{conn.method}") <> " #{path}"
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("(request-target)", request_target)
|
2024-06-12 11:40:44 -06:00
|
|
|
|> maybe_put_created_psudoheader()
|
2024-06-17 15:30:14 -06:00
|
|
|
|> maybe_put_expires_psudoheader()
|
2022-08-05 13:31:32 -06:00
|
|
|
|> case do
|
|
|
|
%{assigns: %{digest: digest}} = conn -> put_req_header(conn, "digest", digest)
|
|
|
|
conn -> conn
|
|
|
|
end
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, HTTPSignatures.validate_conn(conn))
|
2022-11-26 12:22:56 -07:00
|
|
|
|> assign(:signature_actor_id, signature_host(conn))
|
2022-08-05 13:31:32 -06:00
|
|
|
|> assign_valid_signature_on_route_aliases(rest)
|
|
|
|
end
|
|
|
|
|
2019-12-16 08:24:03 -07:00
|
|
|
defp maybe_assign_valid_signature(conn) do
|
|
|
|
if has_signature_header?(conn) do
|
2019-07-18 09:06:58 -06:00
|
|
|
# set (request-target) header to the appropriate value
|
|
|
|
# we also replace the digest header with the one we computed
|
2022-08-27 12:05:48 -06:00
|
|
|
possible_paths =
|
|
|
|
route_aliases(conn) ++ [conn.request_path, conn.request_path <> "?#{conn.query_string}"]
|
|
|
|
|
2022-08-05 13:31:32 -06:00
|
|
|
assign_valid_signature_on_route_aliases(conn, possible_paths)
|
2019-07-18 09:06:58 -06:00
|
|
|
else
|
|
|
|
Logger.debug("No signature header!")
|
|
|
|
conn
|
2017-12-12 02:17:21 -07:00
|
|
|
end
|
|
|
|
end
|
2019-12-16 08:24:03 -07:00
|
|
|
|
|
|
|
defp has_signature_header?(conn) do
|
|
|
|
conn |> get_req_header("signature") |> Enum.at(0, false)
|
|
|
|
end
|
|
|
|
|
2022-11-26 12:22:56 -07:00
|
|
|
defp maybe_require_signature(
|
|
|
|
%{assigns: %{valid_signature: true, signature_actor_id: actor_id}} = conn
|
|
|
|
) do
|
|
|
|
# inboxes implicitly need http signatures for authentication
|
|
|
|
# so we don't really know if the instance will have broken federation after
|
|
|
|
# we turn on authorized_fetch_mode.
|
|
|
|
#
|
|
|
|
# to "check" this is a signed fetch, verify if method is GET
|
|
|
|
if conn.method == "GET" do
|
|
|
|
actor_host = URI.parse(actor_id).host
|
|
|
|
|
|
|
|
case @cachex.get(:request_signatures_cache, actor_host) do
|
|
|
|
{:ok, nil} ->
|
|
|
|
Logger.debug("Successful signature from #{actor_host}")
|
|
|
|
Instances.set_request_signatures(actor_host)
|
|
|
|
@cachex.put(:request_signatures_cache, actor_host, true)
|
|
|
|
|
|
|
|
{:ok, true} ->
|
|
|
|
:noop
|
|
|
|
|
|
|
|
any ->
|
2023-08-01 04:43:50 -06:00
|
|
|
Logger.warning(
|
2022-11-26 12:22:56 -07:00
|
|
|
"expected request signature cache to return a boolean, instead got #{inspect(any)}"
|
|
|
|
)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
conn
|
|
|
|
end
|
|
|
|
|
2022-12-19 13:41:48 -07:00
|
|
|
defp maybe_require_signature(conn), do: conn
|
2022-11-26 12:22:56 -07:00
|
|
|
|
|
|
|
defp signature_host(conn) do
|
2024-06-27 20:22:11 -06:00
|
|
|
with {:key_id, %{"keyId" => kid}} <- {:key_id, HTTPSignatures.signature_for_conn(conn)},
|
|
|
|
{:actor_id, {:ok, actor_id}} <- {:actor_id, Signature.key_id_to_actor_id(kid)} do
|
2022-11-26 12:22:56 -07:00
|
|
|
actor_id
|
|
|
|
else
|
2024-06-27 20:22:11 -06:00
|
|
|
{:key_id, e} ->
|
|
|
|
Logger.error("Failed to extract key_id from signature: #{inspect(e)}")
|
|
|
|
nil
|
|
|
|
|
|
|
|
{:actor_id, e} ->
|
|
|
|
Logger.error("Failed to extract actor_id from signature: #{inspect(e)}")
|
|
|
|
nil
|
2022-11-26 12:22:56 -07:00
|
|
|
end
|
|
|
|
end
|
2017-12-12 02:17:21 -07:00
|
|
|
end
|