2019-07-18 17:38:45 +02:00
|
|
|
# Pleroma: A lightweight social networking server
|
2020-03-03 23:44:49 +01:00
|
|
|
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
2019-07-18 17:38:45 +02:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
|
|
|
defmodule Pleroma.Web.Plugs.MappedSignatureToIdentityPlug do
|
2020-12-06 11:59:10 +01:00
|
|
|
alias Pleroma.Helpers.AuthHelper
|
2019-07-18 17:38:45 +02:00
|
|
|
alias Pleroma.Signature
|
|
|
|
alias Pleroma.User
|
|
|
|
alias Pleroma.Web.ActivityPub.Utils
|
|
|
|
|
|
|
|
import Plug.Conn
|
|
|
|
require Logger
|
|
|
|
|
|
|
|
def init(options), do: options
|
|
|
|
|
2020-12-06 11:59:10 +01:00
|
|
|
def call(%{assigns: %{user: %User{}}} = conn, _opts), do: conn
|
2019-07-18 17:38:45 +02:00
|
|
|
|
|
|
|
# if this has payload make sure it is signed by the same actor that made it
|
|
|
|
def call(%{assigns: %{valid_signature: true}, params: %{"actor" => actor}} = conn, _opts) do
|
|
|
|
with actor_id <- Utils.get_ap_id(actor),
|
2019-07-18 18:01:21 +02:00
|
|
|
{:user, %User{} = user} <- {:user, user_from_key_id(conn)},
|
|
|
|
{:user_match, true} <- {:user_match, user.ap_id == actor_id} do
|
2020-12-06 11:59:10 +01:00
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> AuthHelper.skip_oauth()
|
2019-07-18 17:38:45 +02:00
|
|
|
else
|
2019-07-18 18:01:21 +02:00
|
|
|
{:user_match, false} ->
|
|
|
|
Logger.debug("Failed to map identity from signature (payload actor mismatch)")
|
2020-04-14 07:43:47 +02:00
|
|
|
Logger.debug("key_id=#{inspect(key_id_from_conn(conn))}, actor=#{inspect(actor)}")
|
2019-07-18 18:01:21 +02:00
|
|
|
assign(conn, :valid_signature, false)
|
|
|
|
|
|
|
|
# remove me once testsuite uses mapped capabilities instead of what we do now
|
|
|
|
{:user, nil} ->
|
|
|
|
Logger.debug("Failed to map identity from signature (lookup failure)")
|
2020-04-14 07:43:47 +02:00
|
|
|
Logger.debug("key_id=#{inspect(key_id_from_conn(conn))}, actor=#{actor}")
|
2019-07-18 17:38:45 +02:00
|
|
|
conn
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# no payload, probably a signed fetch
|
|
|
|
def call(%{assigns: %{valid_signature: true}} = conn, _opts) do
|
|
|
|
with %User{} = user <- user_from_key_id(conn) do
|
2020-12-06 11:59:10 +01:00
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> AuthHelper.skip_oauth()
|
2019-07-18 17:38:45 +02:00
|
|
|
else
|
|
|
|
_ ->
|
|
|
|
Logger.debug("Failed to map identity from signature (no payload actor mismatch)")
|
2020-04-14 07:43:47 +02:00
|
|
|
Logger.debug("key_id=#{inspect(key_id_from_conn(conn))}")
|
2019-07-18 18:01:21 +02:00
|
|
|
assign(conn, :valid_signature, false)
|
2019-07-18 17:38:45 +02:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# no signature at all
|
|
|
|
def call(conn, _opts), do: conn
|
2020-12-06 11:59:10 +01:00
|
|
|
|
|
|
|
defp key_id_from_conn(conn) do
|
|
|
|
with %{"keyId" => key_id} <- HTTPSignatures.signature_for_conn(conn),
|
|
|
|
{:ok, ap_id} <- Signature.key_id_to_actor_id(key_id) do
|
|
|
|
ap_id
|
|
|
|
else
|
|
|
|
_ ->
|
|
|
|
nil
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
defp user_from_key_id(conn) do
|
|
|
|
with key_actor_id when is_binary(key_actor_id) <- key_id_from_conn(conn),
|
|
|
|
{:ok, %User{} = user} <- User.get_or_fetch_by_ap_id(key_actor_id) do
|
|
|
|
user
|
|
|
|
else
|
|
|
|
_ ->
|
|
|
|
nil
|
|
|
|
end
|
|
|
|
end
|
2019-07-18 17:38:45 +02:00
|
|
|
end
|