Plume/plume-common/src/activity_pub/request.rs

127 lines
4.0 KiB
Rust
Raw Normal View History

2018-05-04 17:18:00 +02:00
use base64;
use chrono::{offset::Utc, DateTime};
2018-05-04 17:18:00 +02:00
use openssl::hash::{Hasher, MessageDigest};
use reqwest::header::{ACCEPT, CONTENT_TYPE, DATE, HeaderMap, HeaderValue, USER_AGENT};
2018-10-03 09:31:38 +02:00
use std::ops::Deref;
use std::time::SystemTime;
2018-05-04 17:18:00 +02:00
use activity_pub::{AP_CONTENT_TYPE, ap_accept_header};
2018-05-04 17:18:00 +02:00
use activity_pub::sign::Signer;
const PLUME_USER_AGENT: &str = concat!("Plume/", env!("CARGO_PKG_VERSION"));
2018-05-04 17:18:00 +02:00
pub struct Digest(String);
2018-05-04 17:18:00 +02:00
2018-10-03 09:31:38 +02:00
impl Digest {
pub fn digest(body: &str) -> HeaderValue {
let mut hasher =
Hasher::new(MessageDigest::sha256()).expect("Digest::digest: initialization error");
hasher
.update(body.as_bytes())
.expect("Digest::digest: content insertion error");
let res = base64::encode(&hasher.finish().expect("Digest::digest: finalizing error"));
HeaderValue::from_str(&format!("SHA-256={}", res))
.expect("Digest::digest: header creation error")
2018-10-03 09:31:38 +02:00
}
pub fn verify(&self, body: &str) -> bool {
if self.algorithm() == "SHA-256" {
let mut hasher =
Hasher::new(MessageDigest::sha256()).expect("Digest::digest: initialization error");
hasher
.update(body.as_bytes())
.expect("Digest::digest: content insertion error");
self.value().deref()
== hasher
.finish()
.expect("Digest::digest: finalizing error")
.deref()
2018-10-03 09:31:38 +02:00
} else {
false //algorithm not supported
}
}
pub fn algorithm(&self) -> &str {
let pos = self
.0
.find('=')
.expect("Digest::algorithm: invalid header error");
2018-10-03 09:31:38 +02:00
&self.0[..pos]
}
pub fn value(&self) -> Vec<u8> {
let pos = self
.0
.find('=')
.expect("Digest::value: invalid header error") + 1;
base64::decode(&self.0[pos..]).expect("Digest::value: invalid encoding error")
2018-10-03 09:31:38 +02:00
}
pub fn from_header(dig: &str) -> Result<Self, ()> {
if let Some(pos) = dig.find('=') {
let pos = pos + 1;
if base64::decode(&dig[pos..]).is_ok() {
2018-10-03 09:31:38 +02:00
Ok(Digest(dig.to_owned()))
} else {
Err(())
}
} else {
Err(())
}
}
}
pub fn headers() -> HeaderMap {
let date: DateTime<Utc> = SystemTime::now().into();
let date = format!("{}", date.format("%a, %d %b %Y %T %Z"));
let mut headers = HeaderMap::new();
headers.insert(USER_AGENT, HeaderValue::from_static(PLUME_USER_AGENT));
headers.insert(
DATE,
HeaderValue::from_str(&date).expect("request::headers: date error"),
);
headers.insert(
ACCEPT,
HeaderValue::from_str(
&ap_accept_header()
.into_iter()
.collect::<Vec<_>>()
.join(", "),
).expect("request::headers: accept error"),
);
headers.insert(CONTENT_TYPE, HeaderValue::from_static(AP_CONTENT_TYPE));
2018-05-04 17:18:00 +02:00
headers
}
pub fn signature<S: Signer>(signer: &S, headers: &HeaderMap) -> HeaderValue {
let signed_string = headers
.iter()
.map(|(h, v)| {
format!(
"{}: {}",
h.as_str().to_lowercase(),
v.to_str()
.expect("request::signature: invalid header error")
)
})
.collect::<Vec<String>>()
.join("\n");
let signed_headers = headers
.iter()
.map(|(h, _)| h.as_str())
.collect::<Vec<&str>>()
.join(" ")
.to_lowercase();
let data = signer.sign(&signed_string);
let sign = base64::encode(&data);
2018-05-04 17:18:00 +02:00
HeaderValue::from_str(&format!(
"keyId=\"{key_id}\",algorithm=\"rsa-sha256\",headers=\"{signed_headers}\",signature=\"{signature}\"",
key_id = signer.get_key_id(),
2018-05-04 17:18:00 +02:00
signed_headers = signed_headers,
signature = sign
)).expect("request::signature: signature header error")
2018-05-04 17:18:00 +02:00
}