logo

pleroma

My custom branche(s) on git.pleroma.social/pleroma/pleroma git clone https://hacktivis.me/git/pleroma.git

mapped_signature_to_identity_plug.ex (2479B)


  1. # Pleroma: A lightweight social networking server
  2. # Copyright © 2017-2022 Pleroma Authors <https://pleroma.social/>
  3. # SPDX-License-Identifier: AGPL-3.0-only
  4. defmodule Pleroma.Web.Plugs.MappedSignatureToIdentityPlug do
  5. alias Pleroma.Helpers.AuthHelper
  6. alias Pleroma.Signature
  7. alias Pleroma.User
  8. alias Pleroma.Web.ActivityPub.Utils
  9. import Plug.Conn
  10. require Logger
  11. def init(options), do: options
  12. def call(%{assigns: %{user: %User{}}} = conn, _opts), do: conn
  13. # if this has payload make sure it is signed by the same actor that made it
  14. def call(%{assigns: %{valid_signature: true}, params: %{"actor" => actor}} = conn, _opts) do
  15. with actor_id <- Utils.get_ap_id(actor),
  16. {:user, %User{} = user} <- {:user, user_from_key_id(conn)},
  17. {:user_match, true} <- {:user_match, user.ap_id == actor_id} do
  18. conn
  19. |> assign(:user, user)
  20. |> AuthHelper.skip_oauth()
  21. else
  22. {:user_match, false} ->
  23. Logger.debug("Failed to map identity from signature (payload actor mismatch)")
  24. Logger.debug("key_id=#{inspect(key_id_from_conn(conn))}, actor=#{inspect(actor)}")
  25. assign(conn, :valid_signature, false)
  26. # remove me once testsuite uses mapped capabilities instead of what we do now
  27. {:user, nil} ->
  28. Logger.debug("Failed to map identity from signature (lookup failure)")
  29. Logger.debug("key_id=#{inspect(key_id_from_conn(conn))}, actor=#{actor}")
  30. conn
  31. end
  32. end
  33. # no payload, probably a signed fetch
  34. def call(%{assigns: %{valid_signature: true}} = conn, _opts) do
  35. with %User{} = user <- user_from_key_id(conn) do
  36. conn
  37. |> assign(:user, user)
  38. |> AuthHelper.skip_oauth()
  39. else
  40. _ ->
  41. Logger.debug("Failed to map identity from signature (no payload actor mismatch)")
  42. Logger.debug("key_id=#{inspect(key_id_from_conn(conn))}")
  43. assign(conn, :valid_signature, false)
  44. end
  45. end
  46. # no signature at all
  47. def call(conn, _opts), do: conn
  48. defp key_id_from_conn(conn) do
  49. with %{"keyId" => key_id} <- HTTPSignatures.signature_for_conn(conn),
  50. {:ok, ap_id} <- Signature.key_id_to_actor_id(key_id) do
  51. ap_id
  52. else
  53. _ ->
  54. nil
  55. end
  56. end
  57. defp user_from_key_id(conn) do
  58. with key_actor_id when is_binary(key_actor_id) <- key_id_from_conn(conn),
  59. {:ok, %User{} = user} <- User.get_or_fetch_by_ap_id(key_actor_id) do
  60. user
  61. else
  62. _ ->
  63. nil
  64. end
  65. end
  66. end