2019-05-14 14:03:13 -06:00
|
|
|
# Pleroma: A lightweight social networking server
|
2020-03-03 15:44:49 -07:00
|
|
|
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
2019-05-14 14:03:13 -06:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
|
|
|
defmodule Pleroma.Signature do
|
|
|
|
@behaviour HTTPSignatures.Adapter
|
|
|
|
|
2019-05-21 21:58:15 -06:00
|
|
|
alias Pleroma.Keys
|
2019-05-14 14:03:13 -06:00
|
|
|
alias Pleroma.User
|
|
|
|
alias Pleroma.Web.ActivityPub.ActivityPub
|
2019-07-17 13:18:19 -06:00
|
|
|
|
2019-07-18 09:35:42 -06:00
|
|
|
def key_id_to_actor_id(key_id) do
|
2019-07-23 10:47:22 -06:00
|
|
|
uri =
|
|
|
|
URI.parse(key_id)
|
|
|
|
|> Map.put(:fragment, nil)
|
|
|
|
|
|
|
|
uri =
|
2019-07-28 06:17:56 -06:00
|
|
|
if not is_nil(uri.path) and String.ends_with?(uri.path, "/publickey") do
|
2019-07-23 10:47:22 -06:00
|
|
|
Map.put(uri, :path, String.replace(uri.path, "/publickey", ""))
|
|
|
|
else
|
|
|
|
uri
|
|
|
|
end
|
|
|
|
|
2020-05-01 13:29:22 -06:00
|
|
|
case uri do
|
|
|
|
%URI{scheme: scheme} when scheme in ["https", "http"] ->
|
|
|
|
{:ok, URI.to_string(uri)}
|
2020-05-01 10:48:31 -06:00
|
|
|
|
|
|
|
_ ->
|
2020-05-01 13:29:22 -06:00
|
|
|
case Pleroma.Web.WebFinger.finger(URI.to_string(uri)) do
|
2020-05-01 10:48:31 -06:00
|
|
|
%{"ap_id" => ap_id} -> {:ok, ap_id}
|
2020-05-01 13:29:22 -06:00
|
|
|
_ -> {:error, URI.to_string(uri)}
|
2020-05-01 10:48:31 -06:00
|
|
|
end
|
|
|
|
end
|
2019-07-17 13:18:19 -06:00
|
|
|
end
|
2019-05-14 14:03:13 -06:00
|
|
|
|
|
|
|
def fetch_public_key(conn) do
|
2019-07-17 13:18:19 -06:00
|
|
|
with %{"keyId" => kid} <- HTTPSignatures.signature_for_conn(conn),
|
2020-05-01 10:48:31 -06:00
|
|
|
{:ok, actor_id} <- key_id_to_actor_id(kid),
|
2019-05-14 14:03:13 -06:00
|
|
|
{:ok, public_key} <- User.get_public_key_for_ap_id(actor_id) do
|
|
|
|
{:ok, public_key}
|
|
|
|
else
|
|
|
|
e ->
|
|
|
|
{:error, e}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def refetch_public_key(conn) do
|
2019-07-17 13:18:19 -06:00
|
|
|
with %{"keyId" => kid} <- HTTPSignatures.signature_for_conn(conn),
|
2020-05-01 10:48:31 -06:00
|
|
|
{:ok, actor_id} <- key_id_to_actor_id(kid),
|
2019-05-14 14:03:13 -06:00
|
|
|
{:ok, _user} <- ActivityPub.make_user_from_ap_id(actor_id),
|
|
|
|
{:ok, public_key} <- User.get_public_key_for_ap_id(actor_id) do
|
|
|
|
{:ok, public_key}
|
|
|
|
else
|
|
|
|
e ->
|
|
|
|
{:error, e}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def sign(%User{} = user, headers) do
|
2019-10-06 07:22:35 -06:00
|
|
|
with {:ok, %{keys: keys}} <- User.ensure_keys_present(user),
|
2019-05-21 21:58:15 -06:00
|
|
|
{:ok, private_key, _} <- Keys.keys_from_pem(keys) do
|
2019-05-14 14:03:13 -06:00
|
|
|
HTTPSignatures.sign(private_key, user.ap_id <> "#main-key", headers)
|
|
|
|
end
|
|
|
|
end
|
2019-08-22 13:39:06 -06:00
|
|
|
|
|
|
|
def signed_date, do: signed_date(NaiveDateTime.utc_now())
|
|
|
|
|
|
|
|
def signed_date(%NaiveDateTime{} = date) do
|
|
|
|
Timex.format!(date, "{WDshort}, {0D} {Mshort} {YYYY} {h24}:{m}:{s} GMT")
|
|
|
|
end
|
2019-05-14 14:03:13 -06:00
|
|
|
end
|