2018-12-23 20:04:54 +00:00
|
|
|
# Pleroma: A lightweight social networking server
|
2021-01-13 06:49:20 +00:00
|
|
|
# Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
|
2018-12-23 20:04:54 +00:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2017-12-12 09:17:21 +00:00
|
|
|
defmodule Pleroma.Web.Plugs.HTTPSignaturePlug do
|
|
|
|
import Plug.Conn
|
2019-12-19 13:17:18 +00:00
|
|
|
import Phoenix.Controller, only: [get_format: 1, text: 2]
|
2022-08-05 19:31:32 +00:00
|
|
|
alias Pleroma.Activity
|
|
|
|
alias Pleroma.Web.Router
|
2018-02-22 13:57:35 +00:00
|
|
|
require Logger
|
2017-12-12 09:17:21 +00:00
|
|
|
|
|
|
|
def init(options) do
|
|
|
|
options
|
|
|
|
end
|
|
|
|
|
2018-05-04 20:59:01 +00:00
|
|
|
def call(%{assigns: %{valid_signature: true}} = conn, _opts) do
|
2018-02-15 18:58:26 +00:00
|
|
|
conn
|
|
|
|
end
|
|
|
|
|
2018-05-04 20:59:01 +00:00
|
|
|
def call(conn, _opts) do
|
2019-12-19 13:17:18 +00:00
|
|
|
if get_format(conn) == "activity+json" do
|
|
|
|
conn
|
|
|
|
|> maybe_assign_valid_signature()
|
|
|
|
|> maybe_require_signature()
|
|
|
|
else
|
|
|
|
conn
|
|
|
|
end
|
2019-12-16 15:24:03 +00:00
|
|
|
end
|
2018-03-11 13:37:23 +00:00
|
|
|
|
2022-08-27 18:05:48 +00:00
|
|
|
def route_aliases(%{path_info: ["objects", id], query_string: query_string}) do
|
2022-08-05 19:31:32 +00:00
|
|
|
ap_id = Router.Helpers.o_status_url(Pleroma.Web.Endpoint, :object, id)
|
|
|
|
|
|
|
|
with %Activity{} = activity <- Activity.get_by_object_ap_id_with_object(ap_id) do
|
2022-08-27 18:05:48 +00:00
|
|
|
["/notice/#{activity.id}", "/notice/#{activity.id}?#{query_string}"]
|
2022-08-05 19:31:32 +00:00
|
|
|
else
|
|
|
|
_ -> []
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def route_aliases(_), do: []
|
|
|
|
|
|
|
|
defp assign_valid_signature_on_route_aliases(conn, []), do: conn
|
|
|
|
|
|
|
|
defp assign_valid_signature_on_route_aliases(%{assigns: %{valid_signature: true}} = conn, _),
|
|
|
|
do: conn
|
|
|
|
|
|
|
|
defp assign_valid_signature_on_route_aliases(conn, [path | rest]) do
|
|
|
|
request_target = String.downcase("#{conn.method}") <> " #{path}"
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("(request-target)", request_target)
|
|
|
|
|> case do
|
|
|
|
%{assigns: %{digest: digest}} = conn -> put_req_header(conn, "digest", digest)
|
|
|
|
conn -> conn
|
|
|
|
end
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, HTTPSignatures.validate_conn(conn))
|
|
|
|
|> assign_valid_signature_on_route_aliases(rest)
|
|
|
|
end
|
|
|
|
|
2019-12-16 15:24:03 +00:00
|
|
|
defp maybe_assign_valid_signature(conn) do
|
|
|
|
if has_signature_header?(conn) do
|
2019-07-18 15:06:58 +00:00
|
|
|
# set (request-target) header to the appropriate value
|
|
|
|
# we also replace the digest header with the one we computed
|
2022-08-27 18:05:48 +00:00
|
|
|
possible_paths =
|
|
|
|
route_aliases(conn) ++ [conn.request_path, conn.request_path <> "?#{conn.query_string}"]
|
|
|
|
|
2022-08-05 19:31:32 +00:00
|
|
|
assign_valid_signature_on_route_aliases(conn, possible_paths)
|
2019-07-18 15:06:58 +00:00
|
|
|
else
|
|
|
|
Logger.debug("No signature header!")
|
|
|
|
conn
|
2017-12-12 09:17:21 +00:00
|
|
|
end
|
|
|
|
end
|
2019-12-16 15:24:03 +00:00
|
|
|
|
|
|
|
defp has_signature_header?(conn) do
|
|
|
|
conn |> get_req_header("signature") |> Enum.at(0, false)
|
|
|
|
end
|
|
|
|
|
|
|
|
defp maybe_require_signature(%{assigns: %{valid_signature: true}} = conn), do: conn
|
|
|
|
|
|
|
|
defp maybe_require_signature(conn) do
|
|
|
|
if Pleroma.Config.get([:activitypub, :authorized_fetch_mode], false) do
|
|
|
|
conn
|
|
|
|
|> put_status(:unauthorized)
|
2019-12-19 13:17:18 +00:00
|
|
|
|> text("Request not signed")
|
2019-12-16 15:24:03 +00:00
|
|
|
|> halt()
|
|
|
|
else
|
|
|
|
conn
|
|
|
|
end
|
|
|
|
end
|
2017-12-12 09:17:21 +00:00
|
|
|
end
|