2018-12-17 05:44:01 +00:00
|
|
|
<?php
|
|
|
|
|
|
|
|
namespace App\Util\ActivityPub;
|
|
|
|
|
2021-01-17 08:43:57 +00:00
|
|
|
use App\Models\InstanceActor;
|
2018-12-17 05:44:01 +00:00
|
|
|
use App\Profile;
|
2024-08-02 07:40:06 +00:00
|
|
|
use Cache;
|
|
|
|
use DateTime;
|
|
|
|
|
|
|
|
class HttpSignature
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* source: https://github.com/aaronpk/Nautilus/blob/master/app/ActivityPub/HTTPSignature.php
|
|
|
|
* thanks aaronpk!
|
|
|
|
*/
|
|
|
|
|
|
|
|
public static function sign(Profile $profile, $url, $body = false, $addlHeaders = [])
|
|
|
|
{
|
|
|
|
if ($body) {
|
|
|
|
$digest = self::_digest($body);
|
|
|
|
}
|
|
|
|
$user = $profile;
|
|
|
|
$headers = self::_headersToSign($url, $body ? $digest : false);
|
|
|
|
$headers = array_merge($headers, $addlHeaders);
|
|
|
|
$stringToSign = self::_headersToSigningString($headers);
|
|
|
|
$signedHeaders = implode(' ', array_map('strtolower', array_keys($headers)));
|
|
|
|
$key = openssl_pkey_get_private($user->private_key);
|
2024-09-07 06:16:59 +00:00
|
|
|
if (empty($key)) {
|
|
|
|
return [];
|
|
|
|
}
|
2024-08-02 07:40:06 +00:00
|
|
|
openssl_sign($stringToSign, $signature, $key, OPENSSL_ALGO_SHA256);
|
2024-09-07 06:16:59 +00:00
|
|
|
if (empty($signature)) {
|
|
|
|
return [];
|
|
|
|
}
|
2024-08-02 07:40:06 +00:00
|
|
|
$signature = base64_encode($signature);
|
|
|
|
$signatureHeader = 'keyId="'.$user->keyId().'",headers="'.$signedHeaders.'",algorithm="rsa-sha256",signature="'.$signature.'"';
|
|
|
|
unset($headers['(request-target)']);
|
|
|
|
$headers['Signature'] = $signatureHeader;
|
|
|
|
|
|
|
|
return self::_headersToCurlArray($headers);
|
2018-12-17 05:44:01 +00:00
|
|
|
}
|
|
|
|
|
2024-09-07 06:16:59 +00:00
|
|
|
public static function signRaw($privateKey, $keyId, $url, $body = false, $addlHeaders = [])
|
|
|
|
{
|
|
|
|
if (empty($privateKey) || empty($keyId)) {
|
|
|
|
return [];
|
|
|
|
}
|
|
|
|
if ($body) {
|
|
|
|
$digest = self::_digest($body);
|
|
|
|
}
|
|
|
|
$headers = self::_headersToSign($url, $body ? $digest : false);
|
|
|
|
$headers = array_merge($headers, $addlHeaders);
|
|
|
|
$stringToSign = self::_headersToSigningString($headers);
|
|
|
|
$signedHeaders = implode(' ', array_map('strtolower', array_keys($headers)));
|
|
|
|
$key = openssl_pkey_get_private($privateKey);
|
|
|
|
if (empty($key)) {
|
|
|
|
return [];
|
|
|
|
}
|
|
|
|
openssl_sign($stringToSign, $signature, $key, OPENSSL_ALGO_SHA256);
|
|
|
|
if (empty($signature)) {
|
|
|
|
return [];
|
|
|
|
}
|
|
|
|
$signature = base64_encode($signature);
|
|
|
|
$signatureHeader = 'keyId="'.$keyId.'",headers="'.$signedHeaders.'",algorithm="rsa-sha256",signature="'.$signature.'"';
|
|
|
|
unset($headers['(request-target)']);
|
|
|
|
$headers['Signature'] = $signatureHeader;
|
|
|
|
|
|
|
|
return self::_headersToCurlArray($headers);
|
|
|
|
}
|
|
|
|
|
2024-08-02 07:40:06 +00:00
|
|
|
public static function instanceActorSign($url, $body = false, $addlHeaders = [], $method = 'post')
|
|
|
|
{
|
|
|
|
$keyId = config('app.url').'/i/actor#main-key';
|
2024-12-23 08:50:51 +00:00
|
|
|
if(config_cache('database.default') === 'mysql') {
|
|
|
|
$privateKey = Cache::rememberForever(InstanceActor::PKI_PRIVATE, function () {
|
|
|
|
return InstanceActor::first()->private_key;
|
|
|
|
});
|
|
|
|
} else {
|
|
|
|
$privateKey = InstanceActor::first()?->private_key;
|
|
|
|
}
|
|
|
|
abort_if(!$privateKey || empty($privateKey), 400, 'Missing instance actor key, please run php artisan instance:actor');
|
2024-08-02 07:40:06 +00:00
|
|
|
if ($body) {
|
|
|
|
$digest = self::_digest($body);
|
|
|
|
}
|
|
|
|
$headers = self::_headersToSign($url, $body ? $digest : false, $method);
|
|
|
|
$headers = array_merge($headers, $addlHeaders);
|
|
|
|
$stringToSign = self::_headersToSigningString($headers);
|
|
|
|
$signedHeaders = implode(' ', array_map('strtolower', array_keys($headers)));
|
|
|
|
$key = openssl_pkey_get_private($privateKey);
|
|
|
|
openssl_sign($stringToSign, $signature, $key, OPENSSL_ALGO_SHA256);
|
|
|
|
$signature = base64_encode($signature);
|
|
|
|
$signatureHeader = 'keyId="'.$keyId.'",headers="'.$signedHeaders.'",algorithm="rsa-sha256",signature="'.$signature.'"';
|
|
|
|
unset($headers['(request-target)']);
|
|
|
|
$headers['Signature'] = $signatureHeader;
|
|
|
|
|
|
|
|
return $headers;
|
2018-12-17 05:44:01 +00:00
|
|
|
}
|
|
|
|
|
2024-08-02 07:40:06 +00:00
|
|
|
public static function parseSignatureHeader($signature)
|
|
|
|
{
|
|
|
|
$parts = explode(',', $signature);
|
|
|
|
$signatureData = [];
|
|
|
|
|
|
|
|
foreach ($parts as $part) {
|
|
|
|
if (preg_match('/(.+)="(.+)"/', $part, $match)) {
|
|
|
|
$signatureData[$match[1]] = $match[2];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (! isset($signatureData['keyId'])) {
|
|
|
|
return [
|
|
|
|
'error' => 'No keyId was found in the signature header. Found: '.implode(', ', array_keys($signatureData)),
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
if (! filter_var($signatureData['keyId'], FILTER_VALIDATE_URL)) {
|
|
|
|
return [
|
|
|
|
'error' => 'keyId is not a URL: '.$signatureData['keyId'],
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
if (! Helpers::validateUrl($signatureData['keyId'])) {
|
|
|
|
return [
|
|
|
|
'error' => 'keyId is not a URL: '.$signatureData['keyId'],
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
if (! isset($signatureData['headers']) || ! isset($signatureData['signature'])) {
|
|
|
|
return [
|
|
|
|
'error' => 'Signature is missing headers or signature parts',
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
return $signatureData;
|
2018-12-17 05:44:01 +00:00
|
|
|
}
|
|
|
|
|
2024-08-02 07:40:06 +00:00
|
|
|
public static function verify($publicKey, $signatureData, $inputHeaders, $path, $body)
|
|
|
|
{
|
|
|
|
$digest = 'SHA-256='.base64_encode(hash('sha256', $body, true));
|
|
|
|
$headersToSign = [];
|
|
|
|
foreach (explode(' ', $signatureData['headers']) as $h) {
|
|
|
|
if ($h == '(request-target)') {
|
|
|
|
$headersToSign[$h] = 'post '.$path;
|
|
|
|
} elseif ($h == 'digest') {
|
|
|
|
$headersToSign[$h] = $digest;
|
|
|
|
} elseif (isset($inputHeaders[$h][0])) {
|
|
|
|
$headersToSign[$h] = $inputHeaders[$h][0];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
$signingString = self::_headersToSigningString($headersToSign);
|
|
|
|
|
|
|
|
$verified = openssl_verify($signingString, base64_decode($signatureData['signature']), $publicKey, OPENSSL_ALGO_SHA256);
|
|
|
|
|
|
|
|
return [$verified, $signingString];
|
2018-12-17 05:44:01 +00:00
|
|
|
}
|
|
|
|
|
2024-08-02 07:40:06 +00:00
|
|
|
private static function _headersToSigningString($headers)
|
|
|
|
{
|
|
|
|
return implode("\n", array_map(function ($k, $v) {
|
|
|
|
return strtolower($k).': '.$v;
|
|
|
|
}, array_keys($headers), $headers));
|
2018-12-17 05:44:01 +00:00
|
|
|
}
|
|
|
|
|
2024-08-02 07:40:06 +00:00
|
|
|
private static function _headersToCurlArray($headers)
|
|
|
|
{
|
|
|
|
return array_map(function ($k, $v) {
|
|
|
|
return "$k: $v";
|
|
|
|
}, array_keys($headers), $headers);
|
|
|
|
}
|
2018-12-17 05:44:01 +00:00
|
|
|
|
2024-08-02 07:40:06 +00:00
|
|
|
private static function _digest($body)
|
|
|
|
{
|
|
|
|
if (is_array($body)) {
|
|
|
|
$body = json_encode($body);
|
|
|
|
}
|
2018-12-17 05:44:01 +00:00
|
|
|
|
2024-08-02 07:40:06 +00:00
|
|
|
return base64_encode(hash('sha256', $body, true));
|
2018-12-17 05:44:01 +00:00
|
|
|
}
|
|
|
|
|
2024-08-02 07:40:06 +00:00
|
|
|
protected static function _headersToSign($url, $digest = false, $method = 'post')
|
|
|
|
{
|
|
|
|
$date = new DateTime('UTC');
|
2018-12-17 05:44:01 +00:00
|
|
|
|
2024-08-02 07:40:06 +00:00
|
|
|
if (! in_array($method, ['post', 'get'])) {
|
|
|
|
throw new \Exception('Invalid method used to sign headers in HttpSignature');
|
|
|
|
}
|
|
|
|
$headers = [
|
|
|
|
'(request-target)' => $method.' '.parse_url($url, PHP_URL_PATH),
|
|
|
|
'Host' => parse_url($url, PHP_URL_HOST),
|
|
|
|
'Date' => $date->format('D, d M Y H:i:s \G\M\T'),
|
|
|
|
];
|
2018-12-17 05:44:01 +00:00
|
|
|
|
2024-08-02 07:40:06 +00:00
|
|
|
if ($digest) {
|
|
|
|
$headers['Digest'] = 'SHA-256='.$digest;
|
|
|
|
}
|
2018-12-17 05:44:01 +00:00
|
|
|
|
2024-08-02 07:40:06 +00:00
|
|
|
return $headers;
|
|
|
|
}
|
2018-12-17 05:44:01 +00:00
|
|
|
}
|