2061f45dee9faf87d533b8b4babea6bd32b19634
[akkoma] / test / web / http_sigs / http_sig_test.exs
1 # http signatures
2 # Test data from https://tools.ietf.org/html/draft-cavage-http-signatures-08#appendix-C
3 defmodule Pleroma.Web.HTTPSignaturesTest do
4 use Pleroma.DataCase
5 alias Pleroma.Web.HTTPSignatures
6 import Pleroma.Factory
7
8 @private_key (hd(:public_key.pem_decode(File.read!("test/web/http_sigs/priv.key")))
9 |> :public_key.pem_entry_decode())
10
11 @public_key (hd(:public_key.pem_decode(File.read!("test/web/http_sigs/pub.key")))
12 |> :public_key.pem_entry_decode())
13
14 @headers %{
15 "(request-target)" => "post /foo?param=value&pet=dog",
16 "host" => "example.com",
17 "date" => "Thu, 05 Jan 2014 21:31:40 GMT",
18 "content-type" => "application/json",
19 "digest" => "SHA-256=X48E9qOokqqrvdts8nOJRJN3OWDUoyWxBf7kbu9DBPE=",
20 "content-length" => "18"
21 }
22
23 @body "{\"hello\": \"world\"}"
24
25 @default_signature """
26 keyId="Test",algorithm="rsa-sha256",signature="jKyvPcxB4JbmYY4mByyBY7cZfNl4OW9HpFQlG7N4YcJPteKTu4MWCLyk+gIr0wDgqtLWf9NLpMAMimdfsH7FSWGfbMFSrsVTHNTk0rK3usrfFnti1dxsM4jl0kYJCKTGI/UWkqiaxwNiKqGcdlEDrTcUhhsFsOIo8VhddmZTZ8w="
27 """
28
29 @basic_signature """
30 keyId="Test",algorithm="rsa-sha256",headers="(request-target) host date",signature="HUxc9BS3P/kPhSmJo+0pQ4IsCo007vkv6bUm4Qehrx+B1Eo4Mq5/6KylET72ZpMUS80XvjlOPjKzxfeTQj4DiKbAzwJAb4HX3qX6obQTa00/qPDXlMepD2JtTw33yNnm/0xV7fQuvILN/ys+378Ysi082+4xBQFwvhNvSoVsGv4="
31 """
32
33 @all_headers_signature """
34 keyId="Test",algorithm="rsa-sha256",headers="(request-target) host date content-type digest content-length",signature="Ef7MlxLXoBovhil3AlyjtBwAL9g4TN3tibLj7uuNB3CROat/9KaeQ4hW2NiJ+pZ6HQEOx9vYZAyi+7cmIkmJszJCut5kQLAwuX+Ms/mUFvpKlSo9StS2bMXDBNjOh4Auj774GFj4gwjS+3NhFeoqyr/MuN6HsEnkvn6zdgfE2i0="
35 """
36
37 test "split up a signature" do
38 expected = %{
39 "keyId" => "Test",
40 "algorithm" => "rsa-sha256",
41 "signature" => "jKyvPcxB4JbmYY4mByyBY7cZfNl4OW9HpFQlG7N4YcJPteKTu4MWCLyk+gIr0wDgqtLWf9NLpMAMimdfsH7FSWGfbMFSrsVTHNTk0rK3usrfFnti1dxsM4jl0kYJCKTGI/UWkqiaxwNiKqGcdlEDrTcUhhsFsOIo8VhddmZTZ8w=",
42 "headers" => ["date"]
43 }
44
45 assert HTTPSignatures.split_signature(@default_signature) == expected
46 end
47
48 test "validates the default case" do
49 signature = HTTPSignatures.split_signature(@default_signature)
50 assert HTTPSignatures.validate(@headers, signature, @public_key)
51 end
52
53 test "validates the basic case" do
54 signature = HTTPSignatures.split_signature(@basic_signature)
55 assert HTTPSignatures.validate(@headers, signature, @public_key)
56 end
57
58 test "validates the all-headers case" do
59 signature = HTTPSignatures.split_signature(@all_headers_signature)
60 assert HTTPSignatures.validate(@headers, signature, @public_key)
61 end
62
63 test "it contructs a signing string" do
64 expected = "date: Thu, 05 Jan 2014 21:31:40 GMT\ncontent-length: 18"
65 assert expected == HTTPSignatures.build_signing_string(@headers, ["date", "content-length"])
66 end
67
68 test "it validates a conn" do
69 public_key_pem = "-----BEGIN PUBLIC KEY-----\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnGb42rPZIapY4Hfhxrgn\nxKVJczBkfDviCrrYaYjfGxawSw93dWTUlenCVTymJo8meBlFgIQ70ar4rUbzl6GX\nMYvRdku072d1WpglNHXkjKPkXQgngFDrh2sGKtNB/cEtJcAPRO8OiCgPFqRtMiNM\nc8VdPfPdZuHEIZsJ/aUM38EnqHi9YnVDQik2xxDe3wPghOhqjxUM6eLC9jrjI+7i\naIaEygUdyst9qVg8e2FGQlwAeS2Eh8ygCxn+bBlT5OyV59jSzbYfbhtF2qnWHtZy\nkL7KOOwhIfGs7O9SoR2ZVpTEQ4HthNzainIe/6iCR5HGrao/T8dygweXFYRv+k5A\nPQIDAQAB\n-----END PUBLIC KEY-----\n"
70 [public_key] = :public_key.pem_decode(public_key_pem)
71
72 public_key = public_key
73 |> :public_key.pem_entry_decode()
74
75 conn = %{
76 req_headers: [
77 {"host", "localtesting.pleroma.lol"},
78 {"connection", "close"},
79 {"content-length", "2316"},
80 {"user-agent", "http.rb/2.2.2 (Mastodon/2.1.0.rc3; +http://mastodon.example.org/)"},
81 {"date", "Sun, 10 Dec 2017 14:23:49 GMT"},
82 {"digest", "SHA-256=x/bHADMW8qRrq2NdPb5P9fl0lYpKXXpe5h5maCIL0nM="},
83 {"content-type", "application/activity+json"},
84 {"(request-target)", "post /users/demiurge/inbox"},
85 {"signature", "keyId=\"http://mastodon.example.org/users/admin#main-key\",algorithm=\"rsa-sha256\",headers=\"(request-target) user-agent host date digest content-type\",signature=\"i0FQvr51sj9BoWAKydySUAO1RDxZmNY6g7M62IA7VesbRSdFZZj9/fZapLp6YSuvxUF0h80ZcBEq9GzUDY3Chi9lx6yjpUAS2eKb+Am/hY3aswhnAfYd6FmIdEHzsMrpdKIRqO+rpQ2tR05LwiGEHJPGS0p528NvyVxrxMT5H5yZS5RnxY5X2HmTKEgKYYcvujdv7JWvsfH88xeRS7Jlq5aDZkmXvqoR4wFyfgnwJMPLel8P/BUbn8BcXglH/cunR0LUP7sflTxEz+Rv5qg+9yB8zgBsB4C0233WpcJxjeD6Dkq0EcoJObBR56F8dcb7NQtUDu7x6xxzcgSd7dHm5w==\""}]
86 }
87
88 assert HTTPSignatures.validate_conn(conn, public_key)
89 end
90
91 test "it validates a conn and fetches the key" do
92 conn = %{
93 params: %{"actor" => "http://mastodon.example.org/users/admin"},
94 req_headers: [
95 {"host", "localtesting.pleroma.lol"},
96 {"x-forwarded-for", "127.0.0.1"},
97 {"connection", "close"},
98 {"content-length", "2307"},
99 {"user-agent", "http.rb/2.2.2 (Mastodon/2.1.0.rc3; +http://mastodon.example.org/)"},
100 {"date", "Sun, 11 Feb 2018 17:12:01 GMT"},
101 {"digest", "SHA-256=UXsAnMtR9c7mi1FOf6HRMtPgGI1yi2e9nqB/j4rZ99I="},
102 {"content-type", "application/activity+json"},
103 {"signature", "keyId=\"http://mastodon.example.org/users/admin#main-key\",algorithm=\"rsa-sha256\",headers=\"(request-target) user-agent host date digest content-type\",signature=\"qXKqpQXUpC3d9bZi2ioEeAqP8nRMD021CzH1h6/w+LRk4Hj31ARJHDwQM+QwHltwaLDUepshMfz2WHSXAoLmzWtvv7xRwY+mRqe+NGk1GhxVZ/LSrO/Vp7rYfDpfdVtkn36LU7/Bzwxvvaa4ZWYltbFsRBL0oUrqsfmJFswNCQIG01BB52BAhGSCORHKtQyzo1IZHdxl8y80pzp/+FOK2SmHkqWkP9QbaU1qTZzckL01+7M5btMW48xs9zurEqC2sM5gdWMQSZyL6isTV5tmkTZrY8gUFPBJQZgihK44v3qgfWojYaOwM8ATpiv7NG8wKN/IX7clDLRMA8xqKRCOKw==\""},
104 {"(request-target)", "post /users/demiurge/inbox"}
105 ]
106 }
107
108 assert HTTPSignatures.validate_conn(conn)
109 end
110
111 test "it generates a signature" do
112 user = insert(:user)
113 assert HTTPSignatures.sign(user, %{host: "mastodon.example.org"}) =~ "keyId=\""
114 end
115 end