2017-09-18 03:39:57 -06:00
# http signatures
# Test data from https://tools.ietf.org/html/draft-cavage-http-signatures-08#appendix-C
defmodule Pleroma.Web.HTTPSignaturesTest do
use Pleroma.DataCase
alias Pleroma.Web.HTTPSignatures
2018-02-11 12:43:33 -07:00
import Pleroma.Factory
2017-09-18 03:39:57 -06:00
@private_key ( hd ( :public_key . pem_decode ( File . read! ( " test/web/http_sigs/priv.key " ) ) )
|> :public_key . pem_entry_decode ( ) )
@public_key ( hd ( :public_key . pem_decode ( File . read! ( " test/web/http_sigs/pub.key " ) ) )
|> :public_key . pem_entry_decode ( ) )
@headers %{
" (request-target) " = > " post /foo?param=value&pet=dog " ,
" host " = > " example.com " ,
" date " = > " Thu, 05 Jan 2014 21:31:40 GMT " ,
" content-type " = > " application/json " ,
" digest " = > " SHA-256=X48E9qOokqqrvdts8nOJRJN3OWDUoyWxBf7kbu9DBPE= " ,
" content-length " = > " 18 "
}
@body " { \" hello \" : \" world \" } "
@default_signature """
keyId = " Test " , algorithm = " rsa-sha256 " , signature = " jKyvPcxB4JbmYY4mByyBY7cZfNl4OW9HpFQlG7N4YcJPteKTu4MWCLyk+gIr0wDgqtLWf9NLpMAMimdfsH7FSWGfbMFSrsVTHNTk0rK3usrfFnti1dxsM4jl0kYJCKTGI/UWkqiaxwNiKqGcdlEDrTcUhhsFsOIo8VhddmZTZ8w= "
"""
2017-09-18 10:10:21 -06:00
@basic_signature """
keyId = " Test " , algorithm = " rsa-sha256 " , headers = " (request-target) host date " , signature = " HUxc9BS3P/kPhSmJo+0pQ4IsCo007vkv6bUm4Qehrx+B1Eo4Mq5/6KylET72ZpMUS80XvjlOPjKzxfeTQj4DiKbAzwJAb4HX3qX6obQTa00/qPDXlMepD2JtTw33yNnm/0xV7fQuvILN/ys+378Ysi082+4xBQFwvhNvSoVsGv4= "
"""
@all_headers_signature """
keyId = " Test " , algorithm = " rsa-sha256 " , headers = " (request-target) host date content-type digest content-length " , signature = " Ef7MlxLXoBovhil3AlyjtBwAL9g4TN3tibLj7uuNB3CROat/9KaeQ4hW2NiJ+pZ6HQEOx9vYZAyi+7cmIkmJszJCut5kQLAwuX+Ms/mUFvpKlSo9StS2bMXDBNjOh4Auj774GFj4gwjS+3NhFeoqyr/MuN6HsEnkvn6zdgfE2i0= "
"""
2017-09-18 03:39:57 -06:00
test " split up a signature " do
expected = %{
" keyId " = > " Test " ,
" algorithm " = > " rsa-sha256 " ,
" signature " = > " jKyvPcxB4JbmYY4mByyBY7cZfNl4OW9HpFQlG7N4YcJPteKTu4MWCLyk+gIr0wDgqtLWf9NLpMAMimdfsH7FSWGfbMFSrsVTHNTk0rK3usrfFnti1dxsM4jl0kYJCKTGI/UWkqiaxwNiKqGcdlEDrTcUhhsFsOIo8VhddmZTZ8w= " ,
" headers " = > [ " date " ]
}
assert HTTPSignatures . split_signature ( @default_signature ) == expected
end
test " validates the default case " do
signature = HTTPSignatures . split_signature ( @default_signature )
assert HTTPSignatures . validate ( @headers , signature , @public_key )
end
2017-09-18 10:10:21 -06:00
test " validates the basic case " do
signature = HTTPSignatures . split_signature ( @basic_signature )
assert HTTPSignatures . validate ( @headers , signature , @public_key )
end
test " validates the all-headers case " do
signature = HTTPSignatures . split_signature ( @all_headers_signature )
assert HTTPSignatures . validate ( @headers , signature , @public_key )
end
2017-09-18 03:39:57 -06:00
test " it contructs a signing string " do
expected = " date: Thu, 05 Jan 2014 21:31:40 GMT \n content-length: 18 "
assert expected == HTTPSignatures . build_signing_string ( @headers , [ " date " , " content-length " ] )
end
2017-12-11 02:37:40 -07:00
test " it validates a conn " do
public_key_pem = " -----BEGIN PUBLIC KEY----- \n MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnGb42rPZIapY4Hfhxrgn \n xKVJczBkfDviCrrYaYjfGxawSw93dWTUlenCVTymJo8meBlFgIQ70ar4rUbzl6GX \n MYvRdku072d1WpglNHXkjKPkXQgngFDrh2sGKtNB/cEtJcAPRO8OiCgPFqRtMiNM \n c8VdPfPdZuHEIZsJ/aUM38EnqHi9YnVDQik2xxDe3wPghOhqjxUM6eLC9jrjI+7i \n aIaEygUdyst9qVg8e2FGQlwAeS2Eh8ygCxn+bBlT5OyV59jSzbYfbhtF2qnWHtZy \n kL7KOOwhIfGs7O9SoR2ZVpTEQ4HthNzainIe/6iCR5HGrao/T8dygweXFYRv+k5A \n PQIDAQAB \n -----END PUBLIC KEY----- \n "
[ public_key ] = :public_key . pem_decode ( public_key_pem )
public_key = public_key
|> :public_key . pem_entry_decode ( )
conn = %{
req_headers : [
{ " host " , " localtesting.pleroma.lol " } ,
{ " connection " , " close " } ,
{ " content-length " , " 2316 " } ,
{ " user-agent " , " http.rb/2.2.2 (Mastodon/2.1.0.rc3; +http://mastodon.example.org/) " } ,
{ " date " , " Sun, 10 Dec 2017 14:23:49 GMT " } ,
{ " digest " , " SHA-256=x/bHADMW8qRrq2NdPb5P9fl0lYpKXXpe5h5maCIL0nM= " } ,
{ " content-type " , " application/activity+json " } ,
{ " (request-target) " , " post /users/demiurge/inbox " } ,
{ " signature " , " keyId= \" http://mastodon.example.org/users/admin # main-key \" ,algorithm= \" rsa-sha256 \" ,headers= \" (request-target) user-agent host date digest content-type \" ,signature= \" i0FQvr51sj9BoWAKydySUAO1RDxZmNY6g7M62IA7VesbRSdFZZj9/fZapLp6YSuvxUF0h80ZcBEq9GzUDY3Chi9lx6yjpUAS2eKb+Am/hY3aswhnAfYd6FmIdEHzsMrpdKIRqO+rpQ2tR05LwiGEHJPGS0p528NvyVxrxMT5H5yZS5RnxY5X2HmTKEgKYYcvujdv7JWvsfH88xeRS7Jlq5aDZkmXvqoR4wFyfgnwJMPLel8P/BUbn8BcXglH/cunR0LUP7sflTxEz+Rv5qg+9yB8zgBsB4C0233WpcJxjeD6Dkq0EcoJObBR56F8dcb7NQtUDu7x6xxzcgSd7dHm5w== \" " } ]
}
assert HTTPSignatures . validate_conn ( conn , public_key )
end
2018-02-11 12:43:33 -07:00
test " it validates a conn and fetches the key " do
conn = %{
params : %{ " actor " = > " http://mastodon.example.org/users/admin " } ,
req_headers : [
{ " host " , " localtesting.pleroma.lol " } ,
{ " x-forwarded-for " , " 127.0.0.1 " } ,
{ " connection " , " close " } ,
{ " content-length " , " 2307 " } ,
{ " user-agent " , " http.rb/2.2.2 (Mastodon/2.1.0.rc3; +http://mastodon.example.org/) " } ,
{ " date " , " Sun, 11 Feb 2018 17:12:01 GMT " } ,
{ " digest " , " SHA-256=UXsAnMtR9c7mi1FOf6HRMtPgGI1yi2e9nqB/j4rZ99I= " } ,
{ " content-type " , " application/activity+json " } ,
{ " signature " , " keyId= \" http://mastodon.example.org/users/admin # main-key \" ,algorithm= \" rsa-sha256 \" ,headers= \" (request-target) user-agent host date digest content-type \" ,signature= \" qXKqpQXUpC3d9bZi2ioEeAqP8nRMD021CzH1h6/w+LRk4Hj31ARJHDwQM+QwHltwaLDUepshMfz2WHSXAoLmzWtvv7xRwY+mRqe+NGk1GhxVZ/LSrO/Vp7rYfDpfdVtkn36LU7/Bzwxvvaa4ZWYltbFsRBL0oUrqsfmJFswNCQIG01BB52BAhGSCORHKtQyzo1IZHdxl8y80pzp/+FOK2SmHkqWkP9QbaU1qTZzckL01+7M5btMW48xs9zurEqC2sM5gdWMQSZyL6isTV5tmkTZrY8gUFPBJQZgihK44v3qgfWojYaOwM8ATpiv7NG8wKN/IX7clDLRMA8xqKRCOKw== \" " } ,
{ " (request-target) " , " post /users/demiurge/inbox " }
]
}
assert HTTPSignatures . validate_conn ( conn )
end
test " it generates a signature " do
user = insert ( :user )
assert HTTPSignatures . sign ( user , %{ host : " mastodon.example.org " } ) =~ " keyId= \" "
end
2017-09-18 03:39:57 -06:00
end