logo

pleroma

My custom branche(s) on git.pleroma.social/pleroma/pleroma git clone https://anongit.hacktivis.me/git/pleroma.git/

http_signature_plug.ex (3363B)


  1. # Pleroma: A lightweight social networking server
  2. # Copyright © 2017-2022 Pleroma Authors <https://pleroma.social/>
  3. # SPDX-License-Identifier: AGPL-3.0-only
  4. defmodule Pleroma.Web.Plugs.HTTPSignaturePlug do
  5. alias Pleroma.Helpers.InetHelper
  6. import Plug.Conn
  7. import Phoenix.Controller, only: [get_format: 1, text: 2]
  8. alias Pleroma.Signature
  9. alias Pleroma.Web.ActivityPub.MRF
  10. require Logger
  11. @config_impl Application.compile_env(:pleroma, [__MODULE__, :config_impl], Pleroma.Config)
  12. def init(options) do
  13. options
  14. end
  15. def call(%{assigns: %{valid_signature: true}} = conn, _opts), do: conn
  16. # skip for C2S requests from authenticated users
  17. def call(%{assigns: %{user: %Pleroma.User{}}} = conn, _opts) do
  18. if get_format(conn) in ["json", "activity+json"] do
  19. # ensure access token is provided for 2FA
  20. Pleroma.Web.Plugs.EnsureAuthenticatedPlug.call(conn, %{})
  21. else
  22. conn
  23. end
  24. end
  25. def call(conn, _opts) do
  26. if get_format(conn) in ["json", "activity+json"] do
  27. conn
  28. |> maybe_assign_valid_signature()
  29. |> maybe_assign_actor_id()
  30. |> maybe_require_signature()
  31. |> maybe_filter_requests()
  32. else
  33. conn
  34. end
  35. end
  36. defp maybe_assign_valid_signature(conn) do
  37. if has_signature_header?(conn) do
  38. # we replace the digest header with the one we computed in DigestPlug
  39. conn =
  40. case conn do
  41. %{assigns: %{digest: digest}} = conn -> put_req_header(conn, "digest", digest)
  42. conn -> conn
  43. end
  44. assign(conn, :valid_signature, Signature.validate_signature(conn))
  45. else
  46. Logger.debug("No signature header!")
  47. conn
  48. end
  49. end
  50. defp maybe_assign_actor_id(%{assigns: %{valid_signature: true}} = conn) do
  51. adapter = Application.get_env(:http_signatures, :adapter)
  52. {:ok, actor_id} = adapter.get_actor_id(conn)
  53. assign(conn, :actor_id, actor_id)
  54. end
  55. defp maybe_assign_actor_id(conn), do: conn
  56. defp has_signature_header?(conn) do
  57. conn |> get_req_header("signature") |> Enum.at(0, false)
  58. end
  59. defp maybe_require_signature(%{assigns: %{valid_signature: true}} = conn), do: conn
  60. defp maybe_require_signature(%{remote_ip: remote_ip} = conn) do
  61. if @config_impl.get([:activitypub, :authorized_fetch_mode], false) do
  62. exceptions =
  63. @config_impl.get([:activitypub, :authorized_fetch_mode_exceptions], [])
  64. |> Enum.map(&InetHelper.parse_cidr/1)
  65. if Enum.any?(exceptions, fn x -> InetCidr.contains?(x, remote_ip) end) do
  66. conn
  67. else
  68. conn
  69. |> put_status(:unauthorized)
  70. |> text("Request not signed")
  71. |> halt()
  72. end
  73. else
  74. conn
  75. end
  76. end
  77. defp maybe_filter_requests(%{halted: true} = conn), do: conn
  78. defp maybe_filter_requests(conn) do
  79. if @config_impl.get([:activitypub, :authorized_fetch_mode], false) and
  80. conn.assigns[:actor_id] do
  81. %{host: host} = URI.parse(conn.assigns.actor_id)
  82. if MRF.subdomain_match?(rejected_domains(), host) do
  83. conn
  84. |> put_status(:unauthorized)
  85. |> halt()
  86. else
  87. conn
  88. end
  89. else
  90. conn
  91. end
  92. end
  93. defp rejected_domains do
  94. @config_impl.get([:instance, :rejected_instances])
  95. |> Pleroma.Web.ActivityPub.MRF.instance_list_from_tuples()
  96. |> Pleroma.Web.ActivityPub.MRF.subdomains_regex()
  97. end
  98. end